Security vulnerability in Apache bRPC <1.5.0 on all platforms allows attackers to execute arbitrary code via ServerOptions::pid_file.
An attacker that can influence the ServerOptions pid_file parameter with which the bRPC server is started can execute arbitrary code with the permissions of the bRPC process.

1. upgrade to bRPC >= 1.5.0, download link:
2. If you are using an old version of bRPC and hard to upgrade, you can apply this patch:

Source: CVE-2023-31039

답글 남기기

이메일 주소는 공개되지 않습니다. 필수 필드는 *로 표시됩니다