GHSA-9m3x-qqw2-h32h: picklescan missing detection by simple obfuscation of a `builtins.eval` call
An unsafe deserialization vulnerability allows any unauthenticated user to execute arbitrary code on the host loading a pickle payload from an untrusted source.
References
- github.com/advisories/GHSA-9m3x-qqw2-h32h
- github.com/mmaitre314/picklescan
- github.com/mmaitre314/picklescan/commit/173c8f2a869ea9b69b543477525ec70611c3c6f4
- github.com/mmaitre314/picklescan/pull/59
- github.com/mmaitre314/picklescan/releases/tag/v1.0.1
- github.com/mmaitre314/picklescan/security/advisories/GHSA-9m3x-qqw2-h32h
Code Behaviors & Features
Detect and mitigate GHSA-9m3x-qqw2-h32h with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →