CVE-2022-35411
CRITICALRpc.py < 0.6.0 - Insufficiently Protected Credentials
Title source: ruleDescription
rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.
Exploits (5)
github
NO CODE
by Boon-Rekcah · pythonpoc
https://github.com/Boon-Rekcah/CVE-Exploits/tree/main/Python Libraries CVE/CVE-2022-35411 ( rpc.py )
References (4)
Scores
CVSS v3
9.8
EPSS
0.7133
EPSS Percentile
98.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-522
Status
published
Affected Products (2)
rpc.py_project/rpc.py
< 0.6.0
pypi/rpc.py
PyPI
Timeline
Published
Jul 08, 2022
Tracked Since
Feb 18, 2026