rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8rq8-f485-7v8x | rpc.py vulnerable to Deserialization of Untrusted Data |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T09:36:44.447Z
Reserved: 2022-07-08T00:00:00
Link: CVE-2022-35411
No data.
Status : Modified
Published: 2022-07-08T19:15:08.700
Modified: 2024-11-21T07:11:07.480
Link: CVE-2022-35411
No data.
OpenCVE Enrichment
No data.
Github GHSA