| Title | StanfordVL GibsonEnv v0.3.1 command execution |
|---|
| Description | Command Execution Vulnerability in GibsonEnv
GibsonEnv is an embedded active agent Gibson Environment (GIBSON ENVIRONMENT) with real-world sensing capabilities.
The code in line 40 of the gibson\utils\pposgd_fuse.py file in this project uses the cloudpickle.load() function to load an external file, which does not validate the legitimate content of the external file, leading to the creation of a vulnerability that can be exploited by loading a maliciously constructed file and thus achieving command execution. |
|---|
| Source | ⚠️ https://github.com/bayuncao/vul-cve-7 |
|---|
| User | bayuncao (UID 50143) |
|---|
| Submission | 01/24/2024 04:15 (2 years ago) |
|---|
| Moderation | 01/26/2024 18:17 (3 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 252204 [StanfordVL GibsonEnv 0.3.1 pposgd_fuse.py cloudpickle.load deserialization] |
|---|
| Points | 20 |
|---|