GHSA-4r9r-ch6f-vxmx: Picklescan missing detection when calling pytorch function torch.utils.bottleneck.__main__.run_cprofile
N/A
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| picklescan | pip | <= 0.0.27 | 0.0.28 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability is a bypass of the picklescan library, allowing a malicious pickle file to go undetected. The root cause is that picklescan's denylist of dangerous functions was incomplete. An attacker could craft a pickle file that uses functions from the PyTorch library, such as torch.utils.bottleneck.__main__.run_cprofile, to execute arbitrary code. The provided patch addresses this by adding several PyTorch functions to the denylist in src/picklescan/scanner.py. The functions identified as vulnerable are those that were added to the _unsafe_globals dictionary in the patch. These functions would appear in a runtime profile if a malicious pickle file exploiting this vulnerability were to be loaded. The analysis of the patch file provides high confidence in these findings, as the changes are explicitly aimed at mitigating this vulnerability.