| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| picklescan | pip | < 0.0.29 | 0.0.29 |
The core of the vulnerability is a detection bypass in the picklescan library. The tool works by scanning pickle files for a denylist of known dangerous functions. The advisory GHSA-8r4j-24qv-fmq9 revealed that picklescan was not flagging the use of idlelib.calltip.Calltip.fetch_tip, a function in Python's standard library that can be abused to execute arbitrary code. The commit aecd11be98702caa9ba9b12189d91ad596a36114 patches this vulnerability. The analysis of the commit shows that the fix involves updating the dangerous_globals dictionary in src/picklescan/scanner.py to include "idlelib.calltip": {"Calltip.fetch_tip", "get_entity"}. This change ensures that any pickle file attempting to use these functions will be correctly identified as malicious. When an exploit for this picklescan vulnerability is triggered (i.e., a malicious pickle is loaded by a victim), the functions idlelib.calltip.Calltip.fetch_tip or idlelib.calltip.get_entity would appear in the runtime profile or stack trace, as they are the functions being executed to achieve the attacker's goal.
Ongoing coverage of React2Shell