A deserialization flaw is present in Taoensso Nippy before 2.14.2. In some circumstances, it is possible for an attacker to create a malicious payload that, when deserialized, will allow arbitrary code to be executed. This occurs because there is automatic use of the Java Serializable interface.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1116 | A deserialization flaw is present in Taoensso Nippy before 2.14.2. In some circumstances, it is possible for an attacker to create a malicious payload that, when deserialized, will allow arbitrary code to be executed. This occurs because there is automatic use of the Java Serializable interface. |
Github GHSA |
GHSA-p5gm-fgfx-hr7h | Gadget chain attack in Nippy |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/ptaoussanis/nippy/issues/130 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T15:05:11.862Z
Reserved: 2020-08-13T00:00:00
Link: CVE-2020-24164
No data.
Status : Modified
Published: 2020-09-11T06:15:11.903
Modified: 2024-11-21T05:14:27.563
Link: CVE-2020-24164
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA