提出 #578074: iop-apl-uw basestation3 3.0.4 Deserialization情報

タイトルiop-apl-uw basestation3 3.0.4 Deserialization
説明In the basestation3 github repository, the function load_qc_pickl() in QC.py uses Python’s pickle.load() to deserialize data from a file without validating or sanitizing the input. If an attacker supplies a malicious pickle file, they can execute arbitrary code when the file is loaded, resulting in a Remote Code Execution (RCE) vulnerability. This occurs because pickle.load() is inherently unsafe for loading untrusted data, as it can deserialize and invoke arbitrary Python objects, including system calls.
ソース⚠️ https://github.com/iop-apl-uw/basestation3/issues/6
ユーザー
 esharmaji (UID 84358)
送信2025年05月15日 14:28 (12 月 ago)
モデレーション2025年05月17日 15:13 (2 days later)
ステータス承諾済み
VulDBエントリ309461 [iop-apl-uw basestation3 迄 3.0.4 basestation3/QC.py load_qc_pickl qc_file 特権昇格]
ポイント20

Do you need the next level of professionalism?

Upgrade your account now!