Описание
Duplicate Advisory: Possible remote code execution via a remote procedure call
Withdrawn: duplicate of GHSA-pj4g-4488-wmxm
Original Description
In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2019-16328
- https://github.com/advisories/GHSA-9ggp-4jpr-7ppj
- https://github.com/advisories/GHSA-pj4g-4488-wmxm
- https://github.com/pypa/advisory-database/tree/main/vulns/rpyc/PYSEC-2019-118.yaml
- https://github.com/tomerfiliba/rpyc
- https://rpyc.readthedocs.io/en/latest/docs/security.html
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00046.html
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00004.html
Пакеты
Наименование
rpyc
pip
Затронутые версииВерсия исправления
>= 4.1.0, < 4.1.2
4.1.2