Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h5cg-53g7-gqjw

Опубликовано: 06 мар. 2024
Источник: github
Github: Прошло ревью
CVSS4: 8.4
CVSS3: 8.5

Описание

RPyC's missing security check results in code execution when using numpy.array on the server-side.

An issue in Open Source: RPyC v.4.00 thru v.5.3.1 allows a remote attacker to execute arbitrary code via a crafted script to the __array__ attribute component. This vulnerability was introduced in 9f45f826.

Attack Vector

RPyC services that rely on the __array__ attribute used by numpy are impacted. When the server-side exposes a method that calls the attribute named __array__ for a a client provided netref (e.g., np.array(client_netref)), a remote attacker can craft a class which results in remote code execution

Impact

Assuming the system exposes a method that calls the attribute __array__, an attacker can execute code using the vulnerable component.

Patches

The fix is available in RPyC 6.0.0. The major version change is because some users may need to set allow_pickle to True when migrating to RPyC 6.

Workarounds

While the recommend fix is to upgrade to RPyC 6.0.0, the workaround is to apply bba1d356 as patch.

Affected Component

The affected component is the __array__ method constructed for NetrefClass.

References

Пакеты

Наименование

rpyc

pip
Затронутые версииВерсия исправления

>= 4.0.0, < 6.0.0

6.0.0

EPSS

Процентиль: 87%
0.03141
Низкий

8.4 High

CVSS4

8.5 High

CVSS3

Дефекты

CWE-306
CWE-358
CWE-913

Связанные уязвимости

CVSS3: 8.4
ubuntu
почти 2 года назад

In RPyC before 6.0.0, when a server exposes a method that calls the attribute named __array__ for a client-provided netref (e.g., np.array(client_netref)), a remote attacker can craft a class that results in remote code execution.

CVSS3: 8.5
redhat
почти 2 года назад

In RPyC before 6.0.0, when a server exposes a method that calls the attribute named __array__ for a client-provided netref (e.g., np.array(client_netref)), a remote attacker can craft a class that results in remote code execution.

CVSS3: 8.4
nvd
почти 2 года назад

In RPyC before 6.0.0, when a server exposes a method that calls the attribute named __array__ for a client-provided netref (e.g., np.array(client_netref)), a remote attacker can craft a class that results in remote code execution.

CVSS3: 8.4
debian
почти 2 года назад

In RPyC before 6.0.0, when a server exposes a method that calls the at ...

suse-cvrf
почти 2 года назад

Security update for python-rpyc

EPSS

Процентиль: 87%
0.03141
Низкий

8.4 High

CVSS4

8.5 High

CVSS3

Дефекты

CWE-306
CWE-358
CWE-913