First published: Fri Dec 01 2023(Updated: )
A deserialization vulnerability in NettyRpc v1.2 allows attackers to execute arbitrary commands via sending a crafted RPC request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NettyRPC | =1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48886 is a deserialization vulnerability in NettyRpc v1.2 that allows attackers to execute arbitrary commands.
An attacker can exploit CVE-2023-48886 by sending a crafted RPC request.
CVE-2023-48886 has a severity value of 9.8, indicating it is critical.
At the moment, there is no known fix for CVE-2023-48886. It is recommended to follow the official GitHub repository for updates and patches.
CVE-2023-48886 is associated with CWE ID 502.