CVE-2023-23930: Pickle serialization vulnerable to Deserialization of Untrusted Data
7.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.71742%
CWE
Published
10/13/2023
Updated
11/18/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| vantage6 | pip | < 4.0.2 | 4.0.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from using Python's pickle module for serialization/deserialization. The commit diff shows removal of pickle-related functions (deserialize_pickle, serialize_pickle) and replacement with JSON. Key evidence includes: 1) Explicit removal of pickle tests in test_client.py 2) Replacement of pickle.dumps/loads with JSON in critical paths 3) Removal of DataFormat.PICKLE enum 4) Docker wrapper tests showing pickle removal. These functions directly handled untrusted data with insecure pickle operations, making them clear injection points for malicious payloads.