Safety vulnerability ID: 37525
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Rpyc 4.1.2 includes a fix for CVE-2019-16328: a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.
Latest version: 6.0.1
Remote Python Call (RPyC) is a transparent and symmetric distributed computing library
- Fixed `CVE-2019-16328`_ which was caused by a missing protocol security check
- Fixed RPyC over RPyC for mutable parameters and extended unit testing for `346`_
.. _CVE-2019-16328: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16328
.. _346: https://github.com/tomerfiliba/rpyc/issues/346
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application