Miggo Logo

CVE-2023-23930: Pickle serialization vulnerable to Deserialization of Untrusted Data

7.2

CVSS Score
3.1

Basic Information

EPSS Score
0.71742%
Published
10/13/2023
Updated
11/18/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
vantage6pip< 4.0.24.0.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from using Python's pickle module for serialization/deserialization. The commit diff shows removal of pickle-related functions (deserialize_pickle, serialize_pickle) and replacement with JSON. Key evidence includes: 1) Explicit removal of pickle tests in test_client.py 2) Replacement of pickle.dumps/loads with JSON in critical paths 3) Removal of DataFormat.PICKLE enum 4) Docker wrapper tests showing pickle removal. These functions directly handled untrusted data with insecure pickle operations, making them clear injection points for malicious payloads.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### W**t W* *r* usin* pi*kl* *s ****ult s*ri*liz*tion mo*ul* *ut t**t **s known s**urity issu*s (s** *.*. *ttps://m**ium.*om/o**ron*/pyt*on-pi*kl*-is-notoriously-ins**ur*-************). In summ*ry, it is not **vis**l* to op*n Pi*kl*s t**t you *r**t

Reasoning

T** vuln*r**ility st*ms *rom usin* Pyt*on's pi*kl* mo*ul* *or s*ri*liz*tion/**s*ri*liz*tion. T** *ommit *i** s*ows r*mov*l o* pi*kl*-r*l*t** *un*tions (**s*ri*liz*_pi*kl*, s*ri*liz*_pi*kl*) *n* r*pl***m*nt wit* JSON. K*y *vi**n** in*lu**s: *) *xpli*i