CVE-2022-35411
08.07.2022, 19:15
rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.Enginsight
Vendor | Product | Version |
---|---|---|
rpc.py_project | rpc.py | 0.4.2 ≤ 𝑥 ≤ 0.6.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References