All the vulnerabilites related to mmaitre314 - picklescan
cve-2025-1945
Vulnerability from cvelistv5
Published
2025-03-10 11:43
Modified
2025-03-10 12:05
Severity ?
EPSS score ?
Summary
picklescan - Zip Flag Bit Exploit Crashes Picklescan But Not PyTorch
References
Impacted products
▼ | Vendor | Product |
---|---|---|
mmaitre314 | picklescan |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-1945", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-10T12:04:32.561800Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-10T12:05:04.004Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "picklescan", "vendor": "mmaitre314", "versions": [ { "lessThan": "0.0.23", "status": "affected", "version": "0.0.1", "versionType": "python" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Trevor Madge (@madgetr) of Sonatype" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model archives when certain ZIP file flag bits are modified. By flipping specific bits in the ZIP file headers, an attacker can embed malicious pickle files that remain undetected by PickleScan while still being successfully loaded by PyTorch\u0027s torch.load(). This can lead to arbitrary code execution when loading a compromised model." } ], "value": "picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model archives when certain ZIP file flag bits are modified. By flipping specific bits in the ZIP file headers, an attacker can embed malicious pickle files that remain undetected by PickleScan while still being successfully loaded by PyTorch\u0027s torch.load(). This can lead to arbitrary code execution when loading a compromised model." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "LOW", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "LOW", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345 Insufficient Verification of Data Authenticity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-10T11:43:02.158Z", "orgId": "103e4ec9-0a87-450b-af77-479448ddef11", "shortName": "Sonatype" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1945" }, { "tags": [ "vendor-advisory" ], "url": "https://github.com/mmaitre314/picklescan/security/advisories/GHSA-w8jq-xcqf-f792" }, { "tags": [ "patch" ], "url": "https://github.com/mmaitre314/picklescan/commit/e58e45e0d9e091159c1554f9b04828bbb40b9781" } ], "source": { "discovery": "UNKNOWN" }, "title": "picklescan - Zip Flag Bit Exploit Crashes Picklescan But Not PyTorch", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "103e4ec9-0a87-450b-af77-479448ddef11", "assignerShortName": "Sonatype", "cveId": "CVE-2025-1945", "datePublished": "2025-03-10T11:43:02.158Z", "dateReserved": "2025-03-04T12:59:35.306Z", "dateUpdated": "2025-03-10T12:05:04.004Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-1716
Vulnerability from cvelistv5
Published
2025-02-26 14:51
Modified
2025-03-03 15:58
Severity ?
EPSS score ?
Summary
picklescan - Security scanning bypass via 'pip main'
References
Impacted products
▼ | Vendor | Product |
---|---|---|
mmaitre314 | picklescan |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-1716", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-26T15:49:26.250624Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-26T15:49:33.626Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://pypi.org/project/picklescan/", "defaultStatus": "unaffected", "product": "picklescan", "repo": "https://github.com/mmaitre314/picklescan", "vendor": "mmaitre314", "versions": [ { "lessThanOrEqual": "0.0.20", "status": "affected", "version": "0.0.1", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Trevor Madge (@madgetr) of Sonatype" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "picklescan before 0.0.21 does not treat \u0027pip\u0027 as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or GitHub) via `pip.main()`. Because pip is not a restricted global, the model, when scanned with picklescan, would pass security checks and appear to be safe, when it could instead prove to be problematic." } ], "value": "picklescan before 0.0.21 does not treat \u0027pip\u0027 as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or GitHub) via `pip.main()`. Because pip is not a restricted global, the model, when scanned with picklescan, would pass security checks and appear to be safe, when it could instead prove to be problematic." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-184", "description": "CWE-184 Incomplete List of Disallowed Inputs", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-03T15:58:37.163Z", "orgId": "103e4ec9-0a87-450b-af77-479448ddef11", "shortName": "Sonatype" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1716" }, { "tags": [ "patch" ], "url": "https://github.com/mmaitre314/picklescan/commit/78ce704227c51f070c0c5fb4b466d92c62a7aa3d" }, { "tags": [ "third-party-advisory" ], "url": "https://github.com/mmaitre314/picklescan/security/advisories/GHSA-655q-fx9r-782v" } ], "title": "picklescan - Security scanning bypass via \u0027pip main\u0027", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "103e4ec9-0a87-450b-af77-479448ddef11", "assignerShortName": "Sonatype", "cveId": "CVE-2025-1716", "datePublished": "2025-02-26T14:51:38.085Z", "dateReserved": "2025-02-26T12:08:39.343Z", "dateUpdated": "2025-03-03T15:58:37.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-1889
Vulnerability from cvelistv5
Published
2025-03-03 18:38
Modified
2025-03-04 11:43
Severity ?
EPSS score ?
Summary
picklescan - Security scanning bypass via non-standard file extensions
References
▼ | URL | Tags |
---|---|---|
https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1889 | third-party-advisory | |
https://github.com/mmaitre314/picklescan/security/advisories/GHSA-655q-fx9r-782v | third-party-advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
mmaitre314 | picklescan |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-1889", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-03T20:06:20.369355Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-03T20:06:37.045Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://pypi.org/project/picklescan/", "defaultStatus": "unaffected", "packageName": "picklescan", "product": "picklescan", "repo": "https://github.com/mmaitre314/picklescan", "vendor": "mmaitre314", "versions": [ { "lessThanOrEqual": "0.0.21", "status": "affected", "version": "0.0.1", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Trevor Madge (@madgetr) of Sonatype" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "picklescan before 0.0.22 only considers standard pickle file extensions in the scope for its vulnerability scan. An attacker could craft a malicious model that uses Pickle and include a malicious pickle file with a non-standard file extension. Because the malicious pickle file inclusion is not considered as part of the scope of picklescan, the file would pass security checks and appear to be safe, when it could instead prove to be problematic.\u003cbr\u003e" } ], "value": "picklescan before 0.0.22 only considers standard pickle file extensions in the scope for its vulnerability scan. An attacker could craft a malicious model that uses Pickle and include a malicious pickle file with a non-standard file extension. Because the malicious pickle file inclusion is not considered as part of the scope of picklescan, the file would pass security checks and appear to be safe, when it could instead prove to be problematic." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-646", "description": "CWE-646 Reliance on File Name or Extension of Externally-Supplied File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T11:43:39.089Z", "orgId": "103e4ec9-0a87-450b-af77-479448ddef11", "shortName": "Sonatype" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1889" }, { "tags": [ "third-party-advisory" ], "url": "https://github.com/mmaitre314/picklescan/security/advisories/GHSA-655q-fx9r-782v" } ], "source": { "discovery": "UNKNOWN" }, "title": "picklescan - Security scanning bypass via non-standard file extensions", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "103e4ec9-0a87-450b-af77-479448ddef11", "assignerShortName": "Sonatype", "cveId": "CVE-2025-1889", "datePublished": "2025-03-03T18:38:10.046Z", "dateReserved": "2025-03-03T15:51:41.860Z", "dateUpdated": "2025-03-04T11:43:39.089Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-1944
Vulnerability from cvelistv5
Published
2025-03-10 11:30
Modified
2025-03-10 12:09
Severity ?
EPSS score ?
Summary
picklescan ZIP archive manipulation attack leads to crash
References
Impacted products
▼ | Vendor | Product |
---|---|---|
mmaitre314 | picklescan |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-1944", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-10T12:08:11.236471Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-10T12:09:36.612Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "picklescan", "vendor": "mmaitre314", "versions": [ { "lessThan": "0.0.23", "status": "affected", "version": "0.0.1", "versionType": "python" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Trevor Madge (@madgetr) of Sonatype" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes it to crash when attempting to extract and scan PyTorch model archives. By modifying the filename in the ZIP header while keeping the original filename in the directory listing, an attacker can make PickleScan raise a BadZipFile error. However, PyTorch\u0027s more forgiving ZIP implementation still allows the model to be loaded, enabling malicious payloads to bypass detection.\u003cbr\u003e" } ], "value": "picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes it to crash when attempting to extract and scan PyTorch model archives. By modifying the filename in the ZIP header while keeping the original filename in the directory listing, an attacker can make PickleScan raise a BadZipFile error. However, PyTorch\u0027s more forgiving ZIP implementation still allows the model to be loaded, enabling malicious payloads to bypass detection." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "LOW", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "LOW", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345 Insufficient Verification of Data Authenticity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-10T11:30:32.896Z", "orgId": "103e4ec9-0a87-450b-af77-479448ddef11", "shortName": "Sonatype" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1944" }, { "tags": [ "vendor-advisory" ], "url": "https://github.com/mmaitre314/picklescan/security/advisories/GHSA-7q5r-7gvp-wc82" }, { "tags": [ "patch" ], "url": "https://github.com/mmaitre314/picklescan/commit/e58e45e0d9e091159c1554f9b04828bbb40b9781" } ], "source": { "discovery": "UNKNOWN" }, "title": "picklescan ZIP archive manipulation attack leads to crash", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "103e4ec9-0a87-450b-af77-479448ddef11", "assignerShortName": "Sonatype", "cveId": "CVE-2025-1944", "datePublished": "2025-03-10T11:30:32.896Z", "dateReserved": "2025-03-04T12:59:33.809Z", "dateUpdated": "2025-03-10T12:09:36.612Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }