Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-22083

Опубликовано: 17 дек. 2020
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Низкий

Описание

jsonpickle through 1.4.1 allows remote code execution during deserialization of a malicious payload through the decode() function. Note: It has been argued that this is expected and clearly documented behaviour. pickle is known to be capable of causing arbitrary code execution, and must not be used with un-trusted data

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:jsonpickle_project:jsonpickle:*:*:*:*:*:*:*:*
Версия до 1.4.1 (включая)

EPSS

Процентиль: 89%
0.04696
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 5 лет назад

jsonpickle through 1.4.1 allows remote code execution during deserialization of a malicious payload through the decode() function. Note: It has been argued that this is expected and clearly documented behaviour. pickle is known to be capable of causing arbitrary code execution, and must not be used with un-trusted data

redhat
около 5 лет назад

jsonpickle through 1.4.1 allows remote code execution during deserialization of a malicious payload through the decode() function. Note: It has been argued that this is expected and clearly documented behaviour. pickle is known to be capable of causing arbitrary code execution, and must not be used with un-trusted data

CVSS3: 9.8
debian
около 5 лет назад

jsonpickle through 1.4.1 allows remote code execution during deseriali ...

CVSS3: 9.8
github
больше 3 лет назад

jsonpickle unsafe deserialization

EPSS

Процентиль: 89%
0.04696
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-502