Описание
Fickling is a Python pickling decompiler and static analyzer. Prior to version 0.1.7, the unsafe_imports() method in Fickling's static analyzer fails to flag several high-risk Python modules that can be used for arbitrary code execution. Malicious pickles importing these modules will not be detected as unsafe, allowing attackers to bypass Fickling's primary static safety checks. This issue has been patched in version 0.1.7.
Ссылки
- Patch
- Patch
- Patch
- Patch
- Release Notes
- ExploitVendor Advisory
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.1.7 (исключая)
cpe:2.3:a:trailofbits:fickling:*:*:*:*:*:python:*:*
EPSS
Процентиль: 25%
0.00083
Низкий
7.8 High
CVSS3
Дефекты
CWE-184
Связанные уязвимости
github
10 дней назад
Fickling has Static Analysis Bypass via Incomplete Dangerous Module Blocklist
EPSS
Процентиль: 25%
0.00083
Низкий
7.8 High
CVSS3
Дефекты
CWE-184