CVE-2022-35411

CRITICAL

Rpc.py < 0.6.0 - Insufficiently Protected Credentials

Title source: rule

Description

rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.

Exploits (5)

nomisec WORKING POC 2 stars
by CSpanias · poc
https://github.com/CSpanias/rpc-rce.py
nomisec WORKING POC 1 stars
by fuzzlove · poc
https://github.com/fuzzlove/CVE-2022-35411
nomisec WORKING POC
by Neo-okami · poc
https://github.com/Neo-okami/CVE-2022-35411
github NO CODE
by Boon-Rekcah · pythonpoc
https://github.com/Boon-Rekcah/CVE-Exploits/tree/main/Python Libraries CVE/CVE-2022-35411 ( rpc.py )
exploitdb WORKING POC
by Elias Hohl · pythonremotepython
https://www.exploit-db.com/exploits/50983

Scores

CVSS v3 9.8
EPSS 0.7133
EPSS Percentile 98.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-522
Status published

Affected Products (2)

rpc.py_project/rpc.py < 0.6.0
pypi/rpc.py PyPI

Timeline

Published Jul 08, 2022
Tracked Since Feb 18, 2026