Description
In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-pj4g-4488-wmxm | Dynamic modification of RPyC service due to missing security check |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T01:10:41.682Z
Reserved: 2019-09-15T00:00:00.000Z
Link: CVE-2019-16328
No data.
Status : Modified
Published: 2019-10-03T20:15:10.260
Modified: 2024-11-21T04:30:31.787
Link: CVE-2019-16328
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA