GHSA-9726-w42j-3qjr: picklescan has Arbitrary file read using `io.FileIO`
Unsafe pickle deserialization allows unauthenticated attackers to read arbitrary server files and perform SSRF. By chaining io.FileIO and urllib.request.urlopen, an attacker can bypass RCE-focused blocklists to exfiltrate sensitive data (example: /etc/passwd) to an external server.
References
- github.com/advisories/GHSA-9726-w42j-3qjr
- github.com/mmaitre314/picklescan
- github.com/mmaitre314/picklescan/commit/a01c58d5dd7960db557b849817c0ab83ab111ef1
- github.com/mmaitre314/picklescan/pull/55
- github.com/mmaitre314/picklescan/releases/tag/v0.0.35
- github.com/mmaitre314/picklescan/security/advisories/GHSA-9726-w42j-3qjr
Code Behaviors & Features
Detect and mitigate GHSA-9726-w42j-3qjr with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →