-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| picklescan | pip | < 0.0.23 | 0.0.23 |
The vulnerability stemmed from PickleScan's reliance on Python's zipfile module which strictly validated ZIP flag bits. The key vulnerable function was scan_zip_bytes in scanner.py that used zipfile.ZipFile directly. When flag bits like 0x1/0x20/0x40 were set, zipfile.ZipFile.open() would raise exceptions during header parsing, preventing PickleScan from examining the malicious pickle files. The patch replaced zipfile.ZipFile with a custom RelaxedZipFile implementation in scanner.py to tolerate these flags, confirming this was the primary vulnerability vector. The secondary mention of zipfile.ZipFile.open reflects the root cause in the dependency's behavior.
A Semantic Attack on Google Gemini - Read the Latest Research