Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-27758

Опубликовано: 12 мар. 2024
Источник: debian

Описание

In RPyC before 6.0.0, when a server exposes a method that calls the attribute named __array__ for a client-provided netref (e.g., np.array(client_netref)), a remote attacker can craft a class that results in remote code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rpycfixed6.0.0-1package
rpycno-dsabookwormpackage

Примечания

  • https://github.com/tomerfiliba-org/rpyc/security/advisories/GHSA-h5cg-53g7-gqjw

  • https://github.com/tomerfiliba-org/rpyc/issues/551

  • https://github.com/tomerfiliba-org/rpyc/commit/bba1d3562e6f9f1256ec64048cc23001c0bb7516 (6.0.0)

Связанные уязвимости

CVSS3: 8.4
ubuntu
почти 2 года назад

In RPyC before 6.0.0, when a server exposes a method that calls the attribute named __array__ for a client-provided netref (e.g., np.array(client_netref)), a remote attacker can craft a class that results in remote code execution.

CVSS3: 8.5
redhat
почти 2 года назад

In RPyC before 6.0.0, when a server exposes a method that calls the attribute named __array__ for a client-provided netref (e.g., np.array(client_netref)), a remote attacker can craft a class that results in remote code execution.

CVSS3: 8.4
nvd
почти 2 года назад

In RPyC before 6.0.0, when a server exposes a method that calls the attribute named __array__ for a client-provided netref (e.g., np.array(client_netref)), a remote attacker can craft a class that results in remote code execution.

suse-cvrf
почти 2 года назад

Security update for python-rpyc

CVSS3: 8.5
github
почти 2 года назад

RPyC's missing security check results in code execution when using numpy.array on the server-side.