jsonpickle through 1.4.1 allows remote code execution during deserialization of a malicious payload through the decode() function. References: https://github.com/jsonpickle/jsonpickle/issues/332 https://gist.github.com/j0lt-github/bb543e77a1a10c33cb56cf23d0837874
Created python-jsonpickle tracking bugs for this issue: Affects: epel-all [bug 1908871] Affects: fedora-all [bug 1908870]
Statement: Both jsonpickle and pickle are documented as being able to execute arbitrary code when loading pickles, and intended for use only with trusted data. This is expected behaviour, as clearly indicated in the jsonpickle README and at https://docs.python.org/3/library/pickle.html
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-22083