Safety vulnerability ID: 54433
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.
A fix for this issue is on master branch of the project's Github repository.
https://github.com/abersheeran/rpc.py/commit/491e7a841ed9a754796d6ab047a9fb16e23bf8bd
Latest version: 0.1.1
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application