Описание
MS SWIFT Remote Code Execution via unsafe PyYAML deserialization
Description
A Remote Code Execution (RCE) vulnerability exists in the modelscope/ms-swift project due to unsafe use of yaml.load() in combination with vulnerable versions of the PyYAML library (≤ 5.3.1). The issue resides in the tests/run.py script, where a user-supplied YAML configuration file is deserialized using yaml.load() with yaml.FullLoader.
If an attacker can control or replace the YAML configuration file provided to the --run_config argument, they may inject a malicious payload that results in arbitrary code execution.
Affected Repository
- Project: modelscope/ms-swift
- Affect versions: latest
- File:
tests/run.py - GitHub Permalink: https://github.com/modelscope/ms-swift/blob/e02ebfdf34f979bbdba9d935acc1689f8d227b38/tests/run.py#L420
- Dependency: PyYAML <= 5.3.1
Vulnerable Code
Proof of Concept (PoC)
Step 1: Create malicious YAML file (exploit.yaml)
Step 2: Execute with vulnerable PyYAML (<= 5.3.1)
This results in execution of os.system, proving code execution.
Mitigation
- Replace
yaml.load()withyaml.safe_load() - Upgrade PyYAML to version 5.4 or later
Example Fix:
Author
- Discovered by: Yu Rong (戎誉) and Hao Fan (凡浩)
- Contact: [anchor.rongyu020221@gmail.com]
Ссылки
- https://github.com/modelscope/ms-swift/security/advisories/GHSA-fm6c-f59h-7mmg
- https://nvd.nist.gov/vuln/detail/CVE-2025-50460
- https://github.com/modelscope/ms-swift/pull/5174
- https://github.com/modelscope/ms-swift/commit/b3418ed9b050dc079553c275c5ed14cfb2b66cf7
- https://github.com/Anchor0221/CVE-2025-50460
- https://github.com/advisories/GHSA-6757-jp84-gxfx
- https://github.com/modelscope/ms-swift/blob/main/tests/run.py#L420
Пакеты
ms-swift
<= 3.6.3
Отсутствует
Связанные уязвимости
A remote code execution (RCE) vulnerability exists in the ms-swift project version 3.3.0 due to unsafe deserialization in tests/run.py using yaml.load() from the PyYAML library (versions = 5.3.1). If an attacker can control the content of the YAML configuration file passed to the --run_config parameter, arbitrary code can be executed during deserialization. This can lead to full system compromise. The vulnerability is triggered when a malicious YAML file is loaded, allowing the execution of arbitrary Python commands such as os.system(). It is recommended to upgrade PyYAML to version 5.4 or higher, and to use yaml.safe_load() to mitigate the issue.