Description
python jsonpickle 2.0.0 contains a remote code execution vulnerability that allows attackers to execute arbitrary Python commands by deserializing malicious JSON payloads containing py/repr objects. Attackers can craft JSON strings with py/repr directives that invoke the eval function during deserialization to execute system commands and arbitrary code.
Problem types
Improper Control of Generation of Code ('Code Injection')
Product status
Credits
Adi Malyanker, Shay Reuven
References
www.exploit-db.com/exploits/49585 (ExploitDB-49585)
jsonpickle.github.io (Official Product Homepage)
github.com/jsonpickle/jsonpickle (Product Reference)
www.vulncheck.com/...ickle-remote-code-execution-via-py-repr (VulnCheck Advisory: python jsonpickle 2.0.0 Remote Code Execution via py/repr)