GHSA-m7j5-r2p5-c39r: picklescan vulnerable to arbitrary file create using logging.FileHandler
Unsafe pickle deserialization allows unauthenticated attackers to perform Arbitrary File Creation. By chaining the logging.FileHandler class, an attacker can bypass RCE-focused blocklists to create empty files on the server. The vulnerability allows creating zero-byte files in arbitrary locations but does not permit overwriting or modifying existing files.
References
- github.com/advisories/GHSA-m7j5-r2p5-c39r
- github.com/mmaitre314/picklescan
- github.com/mmaitre314/picklescan/commit/4d9bc9cd34bca8672dad3481cd4556d5ba747156
- github.com/mmaitre314/picklescan/pull/60
- github.com/mmaitre314/picklescan/releases/tag/v1.0.1
- github.com/mmaitre314/picklescan/security/advisories/GHSA-m7j5-r2p5-c39r
Code Behaviors & Features
Detect and mitigate GHSA-m7j5-r2p5-c39r with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →