A deserialization vulnerability in NettyRpc v1.2 allows attackers to execute arbitrary commands via sending a crafted RPC request.
References
Link | Resource |
---|---|
https://github.com/luxiaoxun/NettyRpc | Product |
https://github.com/luxiaoxun/NettyRpc/issues/53 | Exploit |
Configurations
History
06 Dec 2023, 20:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/luxiaoxun/NettyRpc - Product | |
References | () https://github.com/luxiaoxun/NettyRpc/issues/53 - Exploit | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:luxiaoxun:nettyrpc:1.2:*:*:*:*:*:*:* | |
CWE | CWE-502 |
01 Dec 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-01 23:15
Updated : 2024-10-11 21:36
NVD link : CVE-2023-48886
Mitre link : CVE-2023-48886
CVE.ORG link : CVE-2023-48886
JSON object : View
Products Affected
luxiaoxun
- nettyrpc
CWE
CWE-502
Deserialization of Untrusted Data