GHSA-f7qq-56ww-84cr
Python Analisi e mitigazione delle vulnerabilità

Panoramica

The vulnerability (GHSA-f7qq-56ww-84cr) affects PickleScan versions <= 0.0.30, with a patch available in version 0.0.31. The security flaw allows malicious actors to bypass PickleScan's unsafe globals check mechanism, potentially leading to arbitrary code execution. The vulnerability stems from PickleScan's strict checking of full module names against its list of unsafe globals, where attackers can circumvent the security check by using subclasses of dangerous imports instead of exact module names (GitHub Advisory).

Dettagli tecnici

The vulnerability exploits PickleScan's module name validation mechanism. The issue occurs because the scanner only checks for exact matches in the unsafe globals dictionary, failing to identify dangerous submodules. For example, when processing imports from packages like 'asyncio.unix_events', the scanner fails to recognize it as dangerous even though 'asyncio' is listed in the unsafe globals dictionary. The vulnerability has a CVSS score of 8.3 (High) with the following metrics: Network attack vector, Low attack complexity, No privileges required, User interaction required, Unchanged scope, and High impact on both confidentiality and integrity (GitHub Advisory).

Impatto

The vulnerability affects any organization or individual using PickleScan to analyze PyTorch models or files distributed as ZIP archives for malicious pickle content. Attackers can craft malicious PyTorch models containing embedded pickle payloads and package them into ZIP archives, successfully bypassing the PickleScan security checks. This bypass could lead to arbitrary code execution on the user's system when these malicious files are processed or loaded (GitHub Advisory).

Mitigazione e soluzioni alternative

The vulnerability has been patched in version 0.0.31 of PickleScan. The fix involves modifying the unsafe globals check to consider submodules of dangerous imports. The patch implements a more comprehensive check that verifies if the imported module starts with any known dangerous module name and ensures proper validation of submodule relationships (GitHub Commit).

Risorse aggiuntive


FonteQuesto report è stato generato utilizzando l'intelligenza artificiale

Imparentato Python Vulnerabilità:

CVE ID

Severità

Punteggio

Tecnologie

Nome del componente

Exploit CISA KEV

Ha la correzione

Data di pubblicazione

GHSA-9mv7-3c64-mmqwHIGH8.7
  • PythonPython
  • xml2rfc
NoSep 10, 2025
GHSA-jgw4-cr84-mqxgHIGH7.8
  • PythonPython
  • picklescan
NoSep 10, 2025
GHSA-mjqp-26hc-grxgHIGH7.5
  • PythonPython
  • picklescan
NoSep 10, 2025
CVE-2025-10193HIGH7.4
  • PythonPython
  • mcp-neo4j-cypher
NoSep 11, 2025
CVE-2025-58065MEDIUM6.5
  • PythonPython
  • flask-appbuilder
NoSep 11, 2025

Valutazione gratuita delle vulnerabilità

Benchmark della tua posizione di sicurezza del cloud

Valuta le tue pratiche di sicurezza cloud in 9 domini di sicurezza per confrontare il tuo livello di rischio e identificare le lacune nelle tue difese.

Richiedi valutazione

Richiedi una demo personalizzata

Pronti a vedere Wiz in azione?

"La migliore esperienza utente che abbia mai visto offre piena visibilità ai carichi di lavoro cloud."
David EstlickCISO (CISO)
"Wiz fornisce un unico pannello di controllo per vedere cosa sta succedendo nei nostri ambienti cloud."
Adam FletcherResponsabile della sicurezza
"Sappiamo che se Wiz identifica qualcosa come critico, in realtà lo è."
Greg PoniatowskiResponsabile della gestione delle minacce e delle vulnerabilità