In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.4.4-1", "binary_name": "python-rpyc-doc" }, { "binary_version": "3.4.4-1", "binary_name": "python3-rpyc" } ] }