| Titre | erdogant pypickle 1.1.5 Insecure Deserialization |
|---|
| Description | In the repository https://github.com/erdogant/pypickle, the function load() in pypickle.py uses Python’s pickle.load() to deserialize data from a file without validating or sanitizing the input. If an attacker supplies a malicious pickle file, they can execute arbitrary code when the file is loaded, resulting in a Remote Code Execution (RCE) vulnerability.
This occurs because pickle.load() is inherently unsafe for loading untrusted data, as it can deserialize and invoke arbitrary Python objects, including system calls. |
|---|
| La source | ⚠️ https://github.com/erdogant/pypickle/issues/2 |
|---|
| Utilisateur | esharmaji (UID 84358) |
|---|
| Soumission | 16/05/2025 13:23 (il y a 11 mois) |
|---|
| Modérer | 25/05/2025 15:42 (9 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 310262 [erdogant pypickle jusqu’à 1.1.5 pypickle/pypickle.py load élévation de privilèges] |
|---|
| Points | 20 |
|---|