Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j424-mc44-f4hj

Опубликовано: 17 сент. 2025
Источник: github
Github: Прошло ревью
CVSS4: 9.3

Описание

Duplicate Advisory: Picklescan Bypass is Possible via File Extension Mismatch

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-jgw4-cr84-mqxg. This link is maintained to preserve external references.

Original Description

An Improper Input Validation vulnerability in the scanning logic of mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass pickle files security checks by supplying a standard pickle file with a PyTorch-related file extension. When the pickle file incorrectly considered safe is loaded, it can lead to the execution of malicious code.

Пакеты

Наименование

picklescan

pip
Затронутые версииВерсия исправления

< 0.0.31

0.0.31

9.3 Critical

CVSS4

Дефекты

CWE-20

9.3 Critical

CVSS4

Дефекты

CWE-20