Title | erdogant pypickle 1.1.5 Insecure Deserialization |
---|
Description | In the repository https://github.com/erdogant/pypickle, the function load() in pypickle.py uses Python’s pickle.load() to deserialize data from a file without validating or sanitizing the input. If an attacker supplies a malicious pickle file, they can execute arbitrary code when the file is loaded, resulting in a Remote Code Execution (RCE) vulnerability.
This occurs because pickle.load() is inherently unsafe for loading untrusted data, as it can deserialize and invoke arbitrary Python objects, including system calls. |
---|
Source | ⚠️ https://github.com/erdogant/pypickle/issues/2 |
---|
User | esharmaji (UID 84358) |
---|
Submission | 05/16/2025 01:23 PM (2 months ago) |
---|
Moderation | 05/25/2025 03:42 PM (9 days later) |
---|
Status | Accepted |
---|
VulDB Entry | 310262 [erdogant pypickle up to 1.1.5 pypickle/pypickle.py load deserialization] |
---|
Points | 20 |
---|