Withdrawn: duplicate of GHSA-pj4g-4488-wmxm
In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.
{
"github_reviewed": true,
"nvd_published_at": null,
"github_reviewed_at": "2019-11-19T03:15:00Z",
"severity": "HIGH",
"cwe_ids": []
}