Remote Code Execution via Object Attribute Modification in RPyC 4.1.x through 4.1.1

Remote Code Execution via Object Attribute Modification in RPyC 4.1.x through 4.1.1

CVE-2019-16328 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.

Learn more about our Web Application Penetration Testing UK.