Description
jsonpickle through 1.4.1 allows remote code execution during deserialization of a malicious payload through the decode() function. Note: It has been argued that this is expected and clearly documented behaviour. pickle is known to be capable of causing arbitrary code execution, and must not be used with un-trusted data
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-j66q-qmrc-89rx | jsonpickle unsafe deserialization |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T14:51:09.499Z
Reserved: 2020-08-13T00:00:00.000Z
Link: CVE-2020-22083
No data.
Status : Modified
Published: 2020-12-17T16:15:12.610
Modified: 2024-11-21T05:13:06.340
Link: CVE-2020-22083
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA