Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. picklescan
  4. ›
  5. GHSA-w6mr-mj53-x258

GHSA-w6mr-mj53-x258: Duplicate Advisory: Zip Exploit Crashes Picklescan But Not PyTorch

March 10, 2025

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-7q5r-7gvp-wc82. This link is maintained to preserve external references.

Original Description

picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes it to crash when attempting to extract and scan PyTorch model archives. By modifying the filename in the ZIP header while keeping the original filename in the directory listing, an attacker can make PickleScan raise a BadZipFile error. However, PyTorch’s more forgiving ZIP implementation still allows the model to be loaded, enabling malicious payloads to bypass detection.

References

  • github.com/advisories/GHSA-w6mr-mj53-x258
  • github.com/mmaitre314/picklescan/commit/e58e45e0d9e091159c1554f9b04828bbb40b9781
  • github.com/mmaitre314/picklescan/security/advisories/GHSA-7q5r-7gvp-wc82
  • nvd.nist.gov/vuln/detail/CVE-2025-1944
  • sites.google.com/sonatype.com/vulnerabilities/cve-2025-1944

Code Behaviors & Features

Detect and mitigate GHSA-w6mr-mj53-x258 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.0.23

Fixed versions

  • 0.0.23

Solution

Upgrade to version 0.0.23 or above.

Weakness

  • CWE-345: Insufficient Verification of Data Authenticity

Source file

pypi/picklescan/GHSA-w6mr-mj53-x258.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:56 +0000.