提交 #782201: FedML-AI FedML <= 0.8.9 Remote Code Execution信息

标题FedML-AI FedML <= 0.8.9 Remote Code Execution
描述Fedml is vulnerable to Remote Code Execution (RCE) due to unsafe deserialization in its gRPC communication manager. The application's gRPC server is exposed to all network interfaces (x.x.x.x) via an insecure port without requiring authentication. Network messages received through the sendMessage() RPC are passed directly to pickle.loads(). This allows an unauthenticated remote attacker to send a maliciously crafted Python pickle payload, which upon deserialization executes arbitrary code on the affected federated learning node.
来源⚠️ https://github.com/AnalogyC0de/public_exp/issues/26
用户
 Ana10gy (UID 93358)
提交2026-03-18 09時44分 (19 日前)
管理2026-04-04 08時41分 (17 days later)
状态已接受
VulDB条目355289 [FedML-AI FedML 直到 0.8.9 gRPC server grpc_server.py sendMessage 权限提升]
积分20

Interested in the pricing of exploits?

See the underground prices here!