GHSA-rrxm-2pvv-m66x: Picklescan is vulnerable to RCE via missing detection when calling numpy.f2py.crackfortran.getlincoef
Picklescan uses the numpy.f2py.crackfortran.getlincoef function (a NumPy F2PY helper) to execute arbitrary Python code during unpickling.
References
- github.com/advisories/GHSA-rrxm-2pvv-m66x
- github.com/mmaitre314/picklescan
- github.com/mmaitre314/picklescan/commit/70c1c6c31beb6baaf52c8db1b6c3c0e84a6f9dab
- github.com/mmaitre314/picklescan/pull/53
- github.com/mmaitre314/picklescan/releases/tag/v0.0.33
- github.com/mmaitre314/picklescan/security/advisories/GHSA-rrxm-2pvv-m66x
Code Behaviors & Features
Detect and mitigate GHSA-rrxm-2pvv-m66x with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →