Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-74vm-8frp-7w68

Опубликовано: 04 фев. 2026
Источник: github
Github: Прошло ревью
CVSS3: 10

Описание

EPyT-Flow vulnerable to unsafe JSON deserialization (type)

Impact

EPyT-Flow’s REST API parses attacker-controlled JSON request bodies using a custom deserializer (my_load_from_json) that supports a type field. When type is present, the deserializer dynamically imports an attacker-specified module/class and instantiates it with attacker-supplied arguments. This allows invoking dangerous classes such as subprocess.Popen, which can lead to OS command execution during JSON parsing. This also affects the loading of JSON files.

Patches

EPyT-Flow has been patched in 0.16.1 -- affects all versions <= 0.16.0

Workarounds

Do not load any JSON from untrusted sources and do not expose the REST API.

Credits

EPyT-Flow thanks Jarrett Chan (@syphonetic) for detecting and reporting the bug.

Пакеты

Наименование

epyt-flow

pip
Затронутые версииВерсия исправления

< 0.16.1

0.16.1

10 Critical

CVSS3

Дефекты

CWE-502

10 Critical

CVSS3

Дефекты

CWE-502