Miggo Logo

GHSA-v7x6-rv5q-mhwc: Picklescan missing detection when calling built-in python library function timeit.timeit()

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
4/7/2025
Updated
4/7/2025
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
picklescanpip< 0.0.250.0.25

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The security patches explicitly add 'timeit' to the unsafe_globals list in scanner.py, indicating it was previously missing. The PoC demonstrates attackers could craft payloads using timeit.timeit() to execute OS commands. During exploitation, the runtime profiler would show timeit.timeit being called from the malicious reduce method, which picklescan failed to detect in vulnerable versions. The function signature matches exactly what would appear in stack traces during payload execution.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry Usin* tim*it.tim*it() *un*tion, w*i** is * *uilt-in pyt*on li*r*ry *un*tion to *x**ut* r*mot* pi*kl* *il*. ### **t*ils Pi*kl*’s **s*ri*liz*tion pro**ss is known to *llow *x**ution o* *un*tion vi* r**u** m*t*o*. W*il* Pi*kl*s**n is m**nt

Reasoning

T** s**urity p*t***s *xpli*itly *** 'tim*it' to t** uns***_*lo**ls list in s**nn*r.py, in*i**tin* it w*s pr*viously missin*. T** Po* **monstr*t*s *tt**k*rs *oul* *r**t p*ylo**s usin* tim*it.tim*it() to *x**ut* OS *omm*n*s. *urin* *xploit*tion, t** ru