Duplicate Advisory: Possible remote code execution via a remote procedure call
High severity
GitHub Reviewed
Published
Nov 20, 2019
to the GitHub Advisory Database
•
Updated Oct 26, 2024
Withdrawn
This advisory was withdrawn on Feb 17, 2021
Description
Reviewed
Nov 19, 2019
Published to the GitHub Advisory Database
Nov 20, 2019
Withdrawn
Feb 17, 2021
Last updated
Oct 26, 2024
Withdrawn: duplicate of GHSA-pj4g-4488-wmxm
Original Description
In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.
References