| 제목 | iop-apl-uw basestation3 3.0.4 Deserialization |
|---|
| 설명 | In the basestation3 github repository, the function load_qc_pickl() in QC.py uses Python’s pickle.load() to deserialize data from a file without validating or sanitizing the input. If an attacker supplies a malicious pickle file, they can execute arbitrary code when the file is loaded, resulting in a Remote Code Execution (RCE) vulnerability.
This occurs because pickle.load() is inherently unsafe for loading untrusted data, as it can deserialize and invoke arbitrary Python objects, including system calls. |
|---|
| 원천 | ⚠️ https://github.com/iop-apl-uw/basestation3/issues/6 |
|---|
| 사용자 | esharmaji (UID 84358) |
|---|
| 제출 | 2025. 05. 15. PM 02:28 (11 개월 ago) |
|---|
| 모더레이션 | 2025. 05. 17. PM 03:13 (2 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 309461 [iop-apl-uw basestation3 까지 3.0.4 basestation3/QC.py load_qc_pickl qc_file 권한 상승] |
|---|
| 포인트들 | 20 |
|---|