Safety vulnerability ID: 75819
The information on this page was manually curated by our Cybersecurity Intelligence Team.
PickleScan is vulnerable to a ZIP archive manipulation attack that causes it to crash when attempting to extract and scan PyTorch model archives. By modifying the filename in the ZIP header while keeping the original filename in the directory listing, an attacker can make PickleScan raise a BadZipFile error. However, PyTorch's more forgiving ZIP implementation still allows the model to be loaded, enabling malicious payloads to bypass detection.
Latest version: 0.0.24
Security scanner detecting Python Pickle files performing suspicious actions
What's Changed
* Zip Flag Bit Exploit Crashes Picklescan But Not PyTorch by madgetr in https://github.com/mmaitre314/picklescan/commit/e58e45e0d9e091159c1554f9b04828bbb40b9781 https://github.com/mmaitre314/picklescan/security/advisories/GHSA-w8jq-xcqf-f792
* Zip Exploit Crashes Picklescan But Not PyTorch by madgetr in https://github.com/mmaitre314/picklescan/commit/e58e45e0d9e091159c1554f9b04828bbb40b9781 https://github.com/mmaitre314/picklescan/security/advisories/GHSA-7q5r-7gvp-wc82
**Full Changelog**: https://github.com/mmaitre314/picklescan/compare/v0.0.22...v0.0.23
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application