Описание
In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.
Ссылки
- Broken Link
- Broken Link
- ProductThird Party Advisory
- ExploitVendor Advisory
- Broken Link
- Broken Link
- ProductThird Party Advisory
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 4.1.0 (включая) до 4.1.1 (включая)
cpe:2.3:a:rpyc_project:rpyc:*:*:*:*:*:*:*:*
EPSS
Процентиль: 99%
0.73039
Высокий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-1321
Связанные уязвимости
CVSS3: 7.5
ubuntu
больше 6 лет назад
In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.
CVSS3: 7.5
debian
больше 6 лет назад
In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify ...
CVSS3: 8.5
github
почти 5 лет назад
Dynamic modification of RPyC service due to missing security check
EPSS
Процентиль: 99%
0.73039
Высокий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-1321