R Programming Language implementations are vulnerable to arbitrary code execution during deserialization of .rds and .rd

Post Reply
Shane1145
Posts: 1624
Joined: Wed Sep 25, 2024 2:31 pm

R Programming Language implementations are vulnerable to arbitrary code execution during deserialization of .rds and .rd

Post by Shane1145 »

A vulnerability in the R language that allows for arbitrary code to be executed directly after the deserialization of untrusted data has been discovered. This vulnerability can be exploited through RDS (R Data Serialization) format files and .rdx files. An attacker can create malicious RDS or .rdx formatted files to execute arbitrary commands on the victim's target device.


https://www.kb.cert.org/vuls/id/238194
Post Reply