Описание
rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- PatchThird Party Advisory
- ExploitThird Party Advisory
- Exploit
- ExploitThird Party AdvisoryVDB Entry
- PatchThird Party Advisory
- ExploitThird Party Advisory
- Exploit
Уязвимые конфигурации
Конфигурация 1Версия от 0.4.2 (включая) до 0.6.0 (включая)
cpe:2.3:a:rpc.py_project:rpc.py:*:*:*:*:*:*:*:*
EPSS
Процентиль: 99%
0.71334
Высокий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-522
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
rpc.py vulnerable to Deserialization of Untrusted Data
EPSS
Процентиль: 99%
0.71334
Высокий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-522