Описание
The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 2.2.3dfsg-4 |
devel | DNE | |
edgy | DNE | |
feisty | DNE | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 2.3.5-9ubuntu1.2 |
devel | DNE | |
edgy | DNE | |
feisty | DNE | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 2.4.3-0ubuntu6 |
devel | released | 2.4.4~c1-0ubuntu1 |
edgy | released | 2.4.4~c1-0ubuntu1 |
feisty | released | 2.4.4~c1-0ubuntu1 |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | released | 2.5-2ubuntu2 |
edgy | released | 2.5-2ubuntu2 |
feisty | released | 2.5-2ubuntu2 |
upstream | needs-triage |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.
The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.
The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, ...
The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.
EPSS
7.5 High
CVSS2