PYSEC-2019-118

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/rpyc/PYSEC-2019-118.yaml
JSON Data
https://api.osv.dev/v1/vulns/PYSEC-2019-118
Aliases
Published
2019-10-03T20:15:00Z
Modified
2023-11-08T04:01:17.495506Z
Summary
[none]
Details

In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.

References

Affected packages

PyPI / rpyc

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.1.0
Fixed
4.1.2

Affected versions

4.*

4.1.0
4.1.1