Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-22083

Опубликовано: 17 дек. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5
CVSS3: 9.8

Описание

jsonpickle through 1.4.1 allows remote code execution during deserialization of a malicious payload through the decode() function. Note: It has been argued that this is expected and clearly documented behaviour. pickle is known to be capable of causing arbitrary code execution, and must not be used with un-trusted data

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

disputed
esm-apps/bionic

not-affected

disputed
esm-apps/focal

not-affected

disputed
esm-apps/jammy

not-affected

disputed
esm-apps/noble

not-affected

disputed
esm-apps/xenial

not-affected

disputed
esm-infra-legacy/trusty

DNE

focal

not-affected

disputed
groovy

ignored

end of life

Показывать по

EPSS

Процентиль: 89%
0.04696
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

redhat
около 5 лет назад

jsonpickle through 1.4.1 allows remote code execution during deserialization of a malicious payload through the decode() function. Note: It has been argued that this is expected and clearly documented behaviour. pickle is known to be capable of causing arbitrary code execution, and must not be used with un-trusted data

CVSS3: 9.8
nvd
около 5 лет назад

jsonpickle through 1.4.1 allows remote code execution during deserialization of a malicious payload through the decode() function. Note: It has been argued that this is expected and clearly documented behaviour. pickle is known to be capable of causing arbitrary code execution, and must not be used with un-trusted data

CVSS3: 9.8
debian
около 5 лет назад

jsonpickle through 1.4.1 allows remote code execution during deseriali ...

CVSS3: 9.8
github
больше 3 лет назад

jsonpickle unsafe deserialization

EPSS

Процентиль: 89%
0.04696
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3