
PEACH
Un framework di isolamento del tenant
The vulnerability (GHSA-f7qq-56ww-84cr) affects PickleScan versions <= 0.0.30, with a patch available in version 0.0.31. The security flaw allows malicious actors to bypass PickleScan's unsafe globals check mechanism, potentially leading to arbitrary code execution. The vulnerability stems from PickleScan's strict checking of full module names against its list of unsafe globals, where attackers can circumvent the security check by using subclasses of dangerous imports instead of exact module names (GitHub Advisory).
The vulnerability exploits PickleScan's module name validation mechanism. The issue occurs because the scanner only checks for exact matches in the unsafe globals dictionary, failing to identify dangerous submodules. For example, when processing imports from packages like 'asyncio.unix_events', the scanner fails to recognize it as dangerous even though 'asyncio' is listed in the unsafe globals dictionary. The vulnerability has a CVSS score of 8.3 (High) with the following metrics: Network attack vector, Low attack complexity, No privileges required, User interaction required, Unchanged scope, and High impact on both confidentiality and integrity (GitHub Advisory).
The vulnerability affects any organization or individual using PickleScan to analyze PyTorch models or files distributed as ZIP archives for malicious pickle content. Attackers can craft malicious PyTorch models containing embedded pickle payloads and package them into ZIP archives, successfully bypassing the PickleScan security checks. This bypass could lead to arbitrary code execution on the user's system when these malicious files are processed or loaded (GitHub Advisory).
The vulnerability has been patched in version 0.0.31 of PickleScan. The fix involves modifying the unsafe globals check to consider submodules of dangerous imports. The patch implements a more comprehensive check that verifies if the imported module starts with any known dangerous module name and ensures proper validation of submodule relationships (GitHub Commit).
Fonte: Questo report è stato generato utilizzando l'intelligenza artificiale
Valutazione gratuita delle vulnerabilità
Valuta le tue pratiche di sicurezza cloud in 9 domini di sicurezza per confrontare il tuo livello di rischio e identificare le lacune nelle tue difese.
Richiedi una demo personalizzata
"La migliore esperienza utente che abbia mai visto offre piena visibilità ai carichi di lavoro cloud."
"Wiz fornisce un unico pannello di controllo per vedere cosa sta succedendo nei nostri ambienti cloud."
"Sappiamo che se Wiz identifica qualcosa come critico, in realtà lo è."