Описание
picklescan missing detection by simple obfuscation of a builtins.eval call
Summary
An unsafe deserialization vulnerability allows any unauthenticated user to execute arbitrary code on the host loading a pickle payload from an untrusted source.
Details
It's possible to hide the eval call nested under another callable via getattr.
PoC
Impact
Who is impacted? Any organization or individual relying on picklescan to detect malicious pickle files from untrusted sources.
What is the impact? Attackers can embed malicious code in pickle file that remains undetected but executes when the pickle file is loaded.
Supply Chain Attack: Attackers can distribute infected pickle files to system that load serialized ML models, APIs, or saved Python objects from untrusted sources.
Пакеты
picklescan
< 1.0.1
1.0.1
8.9 High
CVSS4
Дефекты
8.9 High
CVSS4