Submit #272236: StanfordVL GibsonEnv v0.3.1 command executioninfo

TitleStanfordVL GibsonEnv v0.3.1 command execution
DescriptionCommand Execution Vulnerability in GibsonEnv GibsonEnv is an embedded active agent Gibson Environment (GIBSON ENVIRONMENT) with real-world sensing capabilities. The code in line 40 of the gibson\utils\pposgd_fuse.py file in this project uses the cloudpickle.load() function to load an external file, which does not validate the legitimate content of the external file, leading to the creation of a vulnerability that can be exploited by loading a maliciously constructed file and thus achieving command execution.
Source⚠️ https://github.com/bayuncao/vul-cve-7
User
 bayuncao (UID 50143)
Submission01/24/2024 04:15 (2 years ago)
Moderation01/26/2024 18:17 (3 days later)
StatusAccepted
VulDB entry252204 [StanfordVL GibsonEnv 0.3.1 pposgd_fuse.py cloudpickle.load deserialization]
Points20

Do you need the next level of professionalism?

Upgrade your account now!