Описание
In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | not-affected | 3.4.4-1 |
| devel | DNE | |
| esm-apps/bionic | not-affected | 3.4.4-1 |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/focal | DNE | |
| focal | DNE | |
| groovy | DNE | |
| precise/esm | DNE | |
| trusty | ignored | end of standard support |
| trusty/esm | DNE |
Показывать по
10
Ссылки на источники
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
CVSS3: 7.5
nvd
больше 6 лет назад
In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.
CVSS3: 7.5
debian
больше 6 лет назад
In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify ...
CVSS3: 8.5
github
почти 5 лет назад
Dynamic modification of RPyC service due to missing security check
5 Medium
CVSS2
7.5 High
CVSS3