9.8
CVE-2022-35411
- EPSS 71.33%
- Veröffentlicht 08.07.2022 19:15:08
- Zuletzt bearbeitet 21.11.2024 07:11:07
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Rpc.Py Project ≫ Rpc.Py Version >= 0.4.2 <= 0.6.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 71.33% | 0.987 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-522 Insufficiently Protected Credentials
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.