Skip to content

Instantly share code, notes, and snippets.

View renbou's full-sized avatar
🕶️
Chilling & hacking

Artem Mikheev renbou

🕶️
Chilling & hacking
View GitHub Profile
@renbou
renbou / CVE-2024-27758.md
Last active March 6, 2024 07:15
RCE in RPyC bypassing the allow_pickle setting

RCE in RPyC bypassing the allow_pickle setting

As stated in RPyC documentation, new-style (since RPyC 3.00) RPyC servers aren't meant to allow clients complete control over the server:

And the previous case of such bug has been registered as the critical CVE-2019-16328 through which arbitrary code execution with default configuration settings is possible. This vulnerability achieves the same goal through the numpy array deserialization mechanism added to resolve Issue #236, "Trouble accessing remote numpy objects" (tomerfiliba-org/rpyc#236), which seems to have slipped under the radar and