| 제목 | FedML-AI FedML <= 0.8.9 Remote Code Execution |
|---|
| 설명 | Fedml is vulnerable to Remote Code Execution (RCE) due to unsafe deserialization in its gRPC communication manager. The application's gRPC server is exposed to all network interfaces (x.x.x.x) via an insecure port without requiring authentication. Network messages received through the sendMessage() RPC are passed directly to pickle.loads(). This allows an unauthenticated remote attacker to send a maliciously crafted Python pickle payload, which upon deserialization executes arbitrary code on the affected federated learning node.
|
|---|
| 원천 | ⚠️ https://github.com/AnalogyC0de/public_exp/issues/26 |
|---|
| 사용자 | Ana10gy (UID 93358) |
|---|
| 제출 | 2026. 03. 18. AM 09:44 (19 날 ago) |
|---|
| 모더레이션 | 2026. 04. 04. AM 08:41 (17 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 355289 [FedML-AI FedML 까지 0.8.9 gRPC server grpc_server.py sendMessage 권한 상승] |
|---|
| 포인트들 | 20 |
|---|