CVE-2019-16328 — Prototype Pollution in Project Rpyc
Severity
7.5HIGHNVD
EPSS
73.0%
top 1.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 3
Latest updateFeb 17
Description
In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages3 packages
🔴Vulnerability Details
4📋Vendor Advisories
1Debian▶
CVE-2019-16328: rpyc - In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object att...↗2019
📄Research Papers
1💬Community
2Bugzilla▶
CVE-2019-16328 python-rpyc: missing protocol security check leads remote procedure call that executes code for a RPyC service↗2019-11-18
Bugzilla▶
CVE-2019-16328 python-rpyc: missing protocol security check leads remote procedure call that executes code for a RPyC service [fedora-all]↗2019-11-18