vendor:
jsonpickle
by:
Adi Malyanker, Shay Reuven
9.8
CVSS
HIGH
Remote Code Execution
502
CWE
Product Name: jsonpickle
Affected Version From: 1.0.0
Affected Version To: 2.0.0
Patch Exists: NO
Related CWE: N/A
CPE: a:jsonpickle:jsonpickle
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows, Linux
2021
python jsonpickle 2.0.0 – Remote Code Execution
If malicious data is deserialized, it will execute arbitrary Python commands. It is also possible to make system() calls. The vulnerability exists from the first version till the current version for backward compatibility. The payload was found during research made on deserialization functions. The pattern should be: {..{"py/repr":<the module to import>/<the command to be executed.>}..}
Mitigation:
No patch is provided yet.