Duplicate Advisory: Remote Code Execution via Malicious Pickle File Bypassing Static Analysis
Moderate severity
GitHub Reviewed
Published
Mar 3, 2025
to the GitHub Advisory Database
•
Updated Mar 3, 2025
Withdrawn
This advisory was withdrawn on Mar 3, 2025
Description
Published by the National Vulnerability Database
Feb 26, 2025
Published to the GitHub Advisory Database
Mar 3, 2025
Reviewed
Mar 3, 2025
Withdrawn
Mar 3, 2025
Last updated
Mar 3, 2025
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-655q-fx9r-782v. This link is maintained to preserve external references.
Original Description
picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or GitHub) via
pip.main()
. Because pip is not a restricted global, the model, when scanned with picklescan, would pass security checks and appear to be safe, when it could instead prove to be problematic.References