Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-27758

Опубликовано: 12 мар. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 8.4

Описание

In RPyC before 6.0.0, when a server exposes a method that calls the attribute named array for a client-provided netref (e.g., np.array(client_netref)), a remote attacker can craft a class that results in remote code execution.

РелизСтатусПримечание
devel

needs-triage

esm-apps/bionic

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-infra/focal

DNE

focal

DNE

jammy

needs-triage

mantic

ignored

end of life, was needs-triage
noble

needs-triage

oracular

ignored

end of life, was needs-triage

Показывать по

EPSS

Процентиль: 87%
0.03141
Низкий

8.4 High

CVSS3

Связанные уязвимости

CVSS3: 8.5
redhat
почти 2 года назад

In RPyC before 6.0.0, when a server exposes a method that calls the attribute named __array__ for a client-provided netref (e.g., np.array(client_netref)), a remote attacker can craft a class that results in remote code execution.

CVSS3: 8.4
nvd
почти 2 года назад

In RPyC before 6.0.0, when a server exposes a method that calls the attribute named __array__ for a client-provided netref (e.g., np.array(client_netref)), a remote attacker can craft a class that results in remote code execution.

CVSS3: 8.4
debian
почти 2 года назад

In RPyC before 6.0.0, when a server exposes a method that calls the at ...

suse-cvrf
почти 2 года назад

Security update for python-rpyc

CVSS3: 8.5
github
почти 2 года назад

RPyC's missing security check results in code execution when using numpy.array on the server-side.

EPSS

Процентиль: 87%
0.03141
Низкий

8.4 High

CVSS3