Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. rpyc
  4. ›
  5. CVE-2024-27758

CVE-2024-27758: RPyC's missing security check results in code execution when using numpy.array on the server-side.

March 6, 2024

An issue in Open Source: RPyC v.4.00 thru v.5.3.1 allows a remote attacker to execute arbitrary code via a crafted script to the __array__ attribute component. This vulnerability was introduced in 9f45f826.

Attack Vector

RPyC services that rely on the __array__ attribute used by numpy are impacted. When the server-side exposes a method that calls the attribute named __array__ for a a client provided netref (e.g., np.array(client_netref)), a remote attacker can craft a class which results in remote code execution

Impact

Assuming the system exposes a method that calls the attribute __array__, an attacker can execute code using the vulnerable component.

Patches

The fix is available in RPyC 6.0.0. The major version change is because some users may need to set allow_pickle to True when migrating to RPyC 6.

Workarounds

While the recommend fix is to upgrade to RPyC 6.0.0, the workaround is to apply bba1d356 as patch.

Affected Component

The affected component is the __array__ method constructed for NetrefClass.

References

  • Original disclosure by renbou (Artem Mikheev)
  • CVE-2024-27758

References

  • gist.github.com/renbou/957f70d27470982994f12a1d70153d09
  • github.com/advisories/GHSA-h5cg-53g7-gqjw
  • github.com/tomerfiliba-org/rpyc
  • github.com/tomerfiliba-org/rpyc/blob/5.3.1/rpyc/core/netref.py
  • github.com/tomerfiliba-org/rpyc/commit/9f45f8269d4106905db61d82cd529cacdb178911
  • github.com/tomerfiliba-org/rpyc/commit/bba1d3562e6f9f1256ec64048cc23001c0bb7516
  • github.com/tomerfiliba-org/rpyc/security/advisories/GHSA-h5cg-53g7-gqjw
  • nvd.nist.gov/vuln/detail/CVE-2024-27758

Code Behaviors & Features

Detect and mitigate CVE-2024-27758 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 4.0.0 before 6.0.0

Fixed versions

  • 6.0.0

Solution

Upgrade to version 6.0.0 or above.

Impact 8.4 HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-358: Improperly Implemented Security Check for Standard
  • CWE-913: Improper Control of Dynamically-Managed Code Resources

Source file

pypi/rpyc/CVE-2024-27758.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:53 +0000.