Picklescan, a tool designed to scan for malicious pickle files, had a vulnerability in versions before 0.0.22 that allowed remote code execution RCE via malicious pickle files. The tool only considered standard pickle file extensions e.g., `.pkl` during its scan, leaving non-standard extensions unchecked. Attackers could exploit this by crafting a malicious model with a pickle file using a non-standard extension e.g., .data
. Since Picklescan did not include such files in its scan scope, the malicious file would bypass security checks, enabling RCE when deserialized. This vulnerability highlights the importance of comprehensive file extension checks in security tools.
DailyCVE Form:
Platform: Picklescan
Version: < 0.0.22
Vulnerability: RCE Bypass
Severity: Moderate
Date: Mar 3, 2025
What Undercode Say:
Exploitation:
1. Craft malicious pickle file with non-standard extension.
- Embed in a model to bypass Picklescan checks.
3. Execute when deserialized.
Protection:
1. Update to Picklescan 0.0.22 or later.
2. Validate all file extensions during scans.
3. Use safer serialization formats like JSON.
Commands:
- Check Picklescan version:
picklescan --version
- Update Picklescan:
pip install --upgrade picklescan
Code:
- Detect non-standard extensions:
import os malicious_extensions = [".data", ".mal"] for file in os.listdir: if anyfile.endswithext for ext in malicious_extensions: printf"Potential malicious file: {file}"
URLs:
- GitHub Advisory: [GHSA-769v-p64c-89pr]https://github.com/advisories/GHSA-769v-p64c-89pr
- NVD Entry: [CVE-2025-XXXX]https://nvd.nist.gov/vuln/detail/CVE-2025-XXXX
- Picklescan Repository: [Picklescan GitHub]https://github.com/picklescan/picklescan
Analytics:
- Monitor deserialization logs for unusual activity.
- Use static analysis tools to detect malicious code patterns.
- Regularly audit dependencies for vulnerabilities.
Additional Tips:
- Restrict deserialization to trusted sources.
- Implement sandboxing for untrusted code execution.
- Educate developers on secure coding practices.
References:
Reported By: https://github.com/advisories/GHSA-hw34-rqc5-h2gm
Extra Source Hub:
Undercode
Image Source:
Undercode AI DI v2