Miggo Logo

GHSA-4r9r-ch6f-vxmx: Picklescan missing detection when calling pytorch function torch.utils.bottleneck.__main__.run_cprofile

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
8/22/2025
Updated
8/22/2025
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
picklescanpip<= 0.0.270.0.28

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability is a bypass of the picklescan library, allowing a malicious pickle file to go undetected. The root cause is that picklescan's denylist of dangerous functions was incomplete. An attacker could craft a pickle file that uses functions from the PyTorch library, such as torch.utils.bottleneck.__main__.run_cprofile, to execute arbitrary code. The provided patch addresses this by adding several PyTorch functions to the denylist in src/picklescan/scanner.py. The functions identified as vulnerable are those that were added to the _unsafe_globals dictionary in the patch. These functions would appear in a runtime profile if a malicious pickle file exploiting this vulnerability were to be loaded. The analysis of the patch file provides high confidence in these findings, as the changes are explicitly aimed at mitigating this vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry Usin* tor**.utils.*ottl*n**k.__m*in__.run_*pro*il* *un*tion, w*i** is * pytor** li*r*ry *un*tion to *x**ut* r*mot* pi*kl* *il*. ### **t*ils T** *tt**k p*ylo** *x**ut*s in t** *ollowin* st*ps: *irst, t** *tt**k*r *r**t t** p*ylo** *y

Reasoning

T** vuln*r**ility is * *yp*ss o* t** pi*kl*s**n li*r*ry, *llowin* * m*li*ious pi*kl* *il* to *o un**t**t**. T** root **us* is t**t pi*kl*s**n's **nylist o* **n**rous *un*tions w*s in*ompl*t*. *n *tt**k*r *oul* *r**t * pi*kl* *il* t**t us*s *un*tions