Description
In RPyC before 6.0.0, when a server exposes a method that calls the attribute named __array__ for a client-provided netref (e.g., np.array(client_netref)), a remote attacker can craft a class that results in remote code execution.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-h5cg-53g7-gqjw | RPyC's missing security check results in code execution when using numpy.array on the server-side. |
References
History
Wed, 28 May 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T00:34:52.544Z
Reserved: 2024-02-26T00:00:00.000Z
Link: CVE-2024-27758
Updated: 2024-07-25T19:54:32.272Z
Status : Deferred
Published: 2024-03-12T16:15:08.600
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-27758
OpenCVE Enrichment
No data.
Github GHSA