Soumettre #579157: erdogant pypickle 1.1.5 Insecure Deserializationinformation

Titreerdogant pypickle 1.1.5 Insecure Deserialization
DescriptionIn the repository https://github.com/erdogant/pypickle, the function load() in pypickle.py uses Python’s pickle.load() to deserialize data from a file without validating or sanitizing the input. If an attacker supplies a malicious pickle file, they can execute arbitrary code when the file is loaded, resulting in a Remote Code Execution (RCE) vulnerability. This occurs because pickle.load() is inherently unsafe for loading untrusted data, as it can deserialize and invoke arbitrary Python objects, including system calls.
La source⚠️ https://github.com/erdogant/pypickle/issues/2
Utilisateur
 esharmaji (UID 84358)
Soumission16/05/2025 13:23 (il y a 11 mois)
Modérer25/05/2025 15:42 (9 days later)
StatutAccepté
Entrée VulDB310262 [erdogant pypickle jusqu’à 1.1.5 pypickle/pypickle.py load élévation de privilèges]
Points20

Do you need the next level of professionalism?

Upgrade your account now!