-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from picklescan's ZIP handling implementation prior to v0.0.23. The key evidence comes from the commit diff showing scanner.py was modified to replace zipfile.ZipFile with a RelaxedZipFile class. The original implementation in scan_zip_bytes used Python's strict zipfile module that validates header/directory consistency, causing crashes on manipulated files. This created a discrepancy where PyTorch would load malicious models that picklescan couldn't scan due to extraction failures. The function's reliance on zipfile.ZipFile.open() made it vulnerable to specially crafted ZIP archives with header/directory mismatches.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| picklescan | pip | < 0.0.23 | 0.0.23 |