Miggo Logo

GHSA-86cj-95qr-2p4f: Picklescan missing detection when calling pytorch function torch._dynamo.guards.GuardBuilder.get

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
8/22/2025
Updated
8/22/2025
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
picklescanpip<= 0.0.270.0.28

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability lies in the picklescan library's failure to detect a malicious pickle file that uses torch._dynamo.guards.GuardBuilder.get for remote code execution. The patch, identified by commit 7f994d62084fe43f1cffdef2f9bae6923344ef53, addresses this by updating the _unsafe_globals dictionary in src/picklescan/scanner.py to include "torch._dynamo.guards": {"GuardBuilder.get"}. The function scan_pickle_bytes is the primary function responsible for orchestrating the scan of a pickle file. It utilizes the _unsafe_globals list (via the _build_scan_result_from_raw_globals helper function) to determine if any of the globals used in the pickle are malicious. By not having torch._dynamo.guards.GuardBuilder.get in this list, scan_pickle_bytes would fail to report a malicious pickle using this technique. Therefore, scan_pickle_bytes is the vulnerable function as it's the entry point for the flawed detection logic. The patch ensures that this function, and the overall scan, will now correctly identify this threat.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry Usin* tor**._*yn*mo.*u*r*s.*u*r**uil**r.**t *un*tion, w*i** is * pytor** li*r*ry *un*tion to *x**ut* r*mot* pi*kl* *il*. ### **t*ils T** *tt**k p*ylo** *x**ut*s in t** *ollowin* st*ps: *irst, t** *tt**k*r *r**t t** p*ylo** *y **llin*

Reasoning

T** vuln*r**ility li*s in t** `pi*kl*s**n` li*r*ry's **ilur* to **t**t * m*li*ious pi*kl* *il* t**t us*s `tor**._*yn*mo.*u*r*s.*u*r**uil**r.**t` *or r*mot* *o** *x**ution. T** p*t**, i**nti*i** *y *ommit `****************************************`, **