9.8
CVSSv3

CVE-2022-35411

Published: 08/07/2022 Updated: 09/02/2024
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

rpc.py up to and including 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rpc.py project rpc.py

Exploits

rpcpy version 060 suffers from a remote code execution vulnerability ...

Github Repositories

Unauthenticated Remote Code Execution for rpc.py server

rpcpy-exploit Unauthenticated Remote Code Execution for rpcpy server mediumcom/@eliashohl/remote-code-execution-0-day-in-rpc-py-709c76690c30 This vulnerability was assigned CVE-2022-35411 nvdnistgov/vuln/detail/CVE-2022-35411