Описание
scikit-learn Deserialization of Untrusted Data
scikit-learn (aka sklearn) through 0.23.0 can unserialize and execute commands from an untrusted file that is passed to the joblib.load() function, if __reduce__ makes an os.system call.
NOTE: third parties dispute this issue because the joblib.load() function is documented as unsafe and it is the user's responsibility to use the function in a secure manner.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2020-13092
- https://github.com/0FuzzingQ/vuln/blob/master/sklearn%20unserialize.md
- https://github.com/pypa/advisory-database/tree/main/vulns/scikit-learn/PYSEC-2020-107.yaml
- https://scikit-learn.org/stable/modules/model_persistence.html#security-maintainability-limitations
Пакеты
scikit-learn
<= 0.23.0
Отсутствует
Связанные уязвимости
scikit-learn (aka sklearn) through 0.23.0 can unserialize and execute commands from an untrusted file that is passed to the joblib.load() function, if __reduce__ makes an os.system call. NOTE: third parties dispute this issue because the joblib.load() function is documented as unsafe and it is the user's responsibility to use the function in a secure manner
scikit-learn (aka sklearn) through 0.23.0 can unserialize and execute commands from an untrusted file that is passed to the joblib.load() function, if __reduce__ makes an os.system call. NOTE: third parties dispute this issue because the joblib.load() function is documented as unsafe and it is the user's responsibility to use the function in a secure manner
scikit-learn (aka sklearn) through 0.23.0 can unserialize and execute ...