Описание
An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Execution (RCE) via the picklefile parameter in the yacc() function. This parameter accepts a .pkl file that is deserialized with pickle.load() without validation. Because pickle allows execution of embedded code via __reduce__(), an attacker can achieve code execution by passing a malicious pickle file. The parameter is not mentioned in official documentation or the GitHub repository, yet it is active in the PyPI version. This introduces a stealthy backdoor and persistence risk.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | deferred | 2026-01-22 |
| esm-infra/bionic | deferred | 2026-01-22 |
| esm-infra/focal | deferred | 2026-01-22 |
| esm-infra/xenial | deferred | 2026-01-22 |
| jammy | deferred | 2026-01-22 |
| noble | deferred | 2026-01-22 |
| questing | deferred | 2026-01-22 |
| upstream | needs-triage |
Показывать по
EPSS
9.8 Critical
CVSS3
Связанные уязвимости
An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Execution (RCE) via the `picklefile` parameter in the `yacc()` function. This parameter accepts a `.pkl` file that is deserialized with `pickle.load()` without validation. Because `pickle` allows execution of embedded code via `__reduce__()`, an attacker can achieve code execution by passing a malicious pickle file. The parameter is not mentioned in official documentation or the GitHub repository, yet it is active in the PyPI version. This introduces a stealthy backdoor and persistence risk.
An undocumented and unsafe feature in the PLY (Python Lex-Yacc) librar ...
An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Execution (RCE) via the `picklefile` parameter in the `yacc()` function. This parameter accepts a `.pkl` file that is deserialized with `pickle.load()` without validation. Because `pickle` allows execution of embedded code via `__reduce__()`, an attacker can achieve code execution by passing a malicious pickle file. The parameter is not mentioned in official documentation or the GitHub repository, yet it is active in the PyPI version. This introduces a stealthy backdoor and persistence risk.
EPSS
9.8 Critical
CVSS3