CVE-2019-16328Prototype Pollution in Project Rpyc

Severity
7.5HIGHNVD
EPSS
73.0%
top 1.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 3
Latest updateFeb 17

Description

In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

PyPIrpyc_project/rpyc4.1.04.1.2+1
NVDrpyc_project/rpyc4.1.04.1.1
debiandebian/rpyc

🔴Vulnerability Details

4
OSV
Dynamic modification of RPyC service due to missing security check2021-02-17
GHSA
Dynamic modification of RPyC service due to missing security check2021-02-17
OSV
Duplicate Advisory: Possible remote code execution via a remote procedure call2019-11-20
OSV
CVE-2019-16328: In RPyC 42019-10-03

📋Vendor Advisories

1
Debian
CVE-2019-16328: rpyc - In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object att...2019

📄Research Papers

1
CTF
20230206-DiceCTF2023-EN / README2023

💬Community

2
Bugzilla
CVE-2019-16328 python-rpyc: missing protocol security check leads remote procedure call that executes code for a RPyC service2019-11-18
Bugzilla
CVE-2019-16328 python-rpyc: missing protocol security check leads remote procedure call that executes code for a RPyC service [fedora-all]2019-11-18