Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-56005

Опубликовано: 20 янв. 2026
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Execution (RCE) via the picklefile parameter in the yacc() function. This parameter accepts a .pkl file that is deserialized with pickle.load() without validation. Because pickle allows execution of embedded code via __reduce__(), an attacker can achieve code execution by passing a malicious pickle file. The parameter is not mentioned in official documentation or the GitHub repository, yet it is active in the PyPI version. This introduces a stealthy backdoor and persistence risk. NOTE: A third-party states that this vulnerability should be rejected because the proof of concept does not demonstrate arbitrary code execution and fails to complete successfully.

An arbitrary code execution vulnerability was discovered in PLY (Python Lex-Yacc). When an application uses PLY's undocumented picklefile parameter to load cached parser data, the library deserializes the pickle file without validation. If an attacker can supply or modify the pickle file being loaded, they can embed malicious code that executes automatically during the deserialization process, potentially allowing them to run arbitrary commands on the affected system.

Отчет

This vulnerability rates as Important rather than Critical because it only affects applications using an undocumented parameter (picklefile) in legacy PLY versions 3.2-3.11, which was designed for an atypical use case (Jython environments with oversized parser tables). Exploitation requires the target application to have explicitly implemented this undocumented parameter in their code and depends on the attacker's ability to influence which pickle file gets loaded—whether through shared directory race conditions, configuration injection, supply chain compromise, or chaining with separate vulnerabilities like file upload or path traversal—making this a conditional, context-dependent vulnerability rather than a universally exploitable critical flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Fence Agents Remediation Operatorworkload-availability/fence-agents-remediation-rhel9-operatorAffected
Migration Toolkit for Containersrhmtc/openshift-migration-hook-runner-rhel8Affected
Migration Toolkit for Containersrhmtc/openshift-migration-rhel8-operatorAffected
Migration Toolkit for Virtualizationmigration-toolkit-virtualization/mtv-must-gather-rhel8Will not fix
Migration Toolkit for Virtualizationmigration-toolkit-virtualization/mtv-rhel9-operatorWill not fix
Migration Toolkit for Virtualizationmtv-candidate/mtv-must-gather-rhel8Will not fix
Migration Toolkit for Virtualizationmtv-candidate/mtv-rhel9-operatorWill not fix
OpenShift Developer Tools and Servicesocp-tools-4/jenkins-agent-base-rhel8Affected
OpenShift Developer Tools and Servicesocp-tools-4/jenkins-rhel8Not affected
OpenShift Pipelinesopenshift-pipelines/pipelines-console-plugin-rhel8Will not fix

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=2431308ply: python-ply: Unsafe pickle file handling in Ply

EPSS

Процентиль: 76%
0.0095
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
3 месяца назад

An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Execution (RCE) via the `picklefile` parameter in the `yacc()` function. This parameter accepts a `.pkl` file that is deserialized with `pickle.load()` without validation. Because `pickle` allows execution of embedded code via `__reduce__()`, an attacker can achieve code execution by passing a malicious pickle file. The parameter is not mentioned in official documentation or the GitHub repository, yet it is active in the PyPI version. This introduces a stealthy backdoor and persistence risk. NOTE: A third-party states that this vulnerability should be rejected because the proof of concept does not demonstrate arbitrary code execution and fails to complete successfully.

CVSS3: 9.8
nvd
3 месяца назад

An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Execution (RCE) via the `picklefile` parameter in the `yacc()` function. This parameter accepts a `.pkl` file that is deserialized with `pickle.load()` without validation. Because `pickle` allows execution of embedded code via `__reduce__()`, an attacker can achieve code execution by passing a malicious pickle file. The parameter is not mentioned in official documentation or the GitHub repository, yet it is active in the PyPI version. This introduces a stealthy backdoor and persistence risk. NOTE: A third-party states that this vulnerability should be rejected because the proof of concept does not demonstrate arbitrary code execution and fails to complete successfully.

CVSS3: 9.8
debian
3 месяца назад

An undocumented and unsafe feature in the PLY (Python Lex-Yacc) librar ...

CVSS3: 9.8
github
3 месяца назад

An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Execution (RCE) via the `picklefile` parameter in the `yacc()` function. This parameter accepts a `.pkl` file that is deserialized with `pickle.load()` without validation. Because `pickle` allows execution of embedded code via `__reduce__()`, an attacker can achieve code execution by passing a malicious pickle file. The parameter is not mentioned in official documentation or the GitHub repository, yet it is active in the PyPI version. This introduces a stealthy backdoor and persistence risk.

EPSS

Процентиль: 76%
0.0095
Низкий

7.8 High

CVSS3