Description
A deserialization flaw is present in Taoensso Nippy before 2.14.2. In some circumstances, it is possible for an attacker to create a malicious payload that, when deserialized, will allow arbitrary code to be executed. This occurs because there is automatic use of the Java Serializable interface.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1116 | A deserialization flaw is present in Taoensso Nippy before 2.14.2. In some circumstances, it is possible for an attacker to create a malicious payload that, when deserialized, will allow arbitrary code to be executed. This occurs because there is automatic use of the Java Serializable interface. |
Github GHSA |
GHSA-p5gm-fgfx-hr7h | Gadget chain attack in Nippy |
References
| Link | Providers |
|---|---|
| https://github.com/ptaoussanis/nippy/issues/130 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T15:05:11.862Z
Reserved: 2020-08-13T00:00:00.000Z
Link: CVE-2020-24164
No data.
Status : Modified
Published: 2020-09-11T06:15:11.903
Modified: 2024-11-21T05:14:27.563
Link: CVE-2020-24164
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA