Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-5523 | Picklescan Allows Remote Code Execution via Malicious Pickle File Bypassing Static Analysis |
Github GHSA |
GHSA-769v-p64c-89pr | PyTorch Model Files Can Bypass Pickle Scanners via Unexpected Pickle Extensions |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 05 Mar 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mmaitre314
Mmaitre314 picklescan |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:mmaitre314:picklescan:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Mmaitre314
Mmaitre314 picklescan |
|
| Metrics |
cvssV3_1
|
Tue, 04 Mar 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-807 |
Tue, 04 Mar 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-646 |
Tue, 04 Mar 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | picklescan before 0.0.22 only considers standard pickle file extensions in the scope for its vulnerability scan. An attacker could craft a malicious model that uses Pickle include a malicious pickle file with a non-standard file extension. Because the malicious pickle file inclusion is not considered as part of the scope of picklescan, the file would pass security checks and appear to be safe, when it could instead prove to be problematic. | picklescan before 0.0.22 only considers standard pickle file extensions in the scope for its vulnerability scan. An attacker could craft a malicious model that uses Pickle and include a malicious pickle file with a non-standard file extension. Because the malicious pickle file inclusion is not considered as part of the scope of picklescan, the file would pass security checks and appear to be safe, when it could instead prove to be problematic. |
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 03 Mar 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | picklescan before 0.0.22 only considers standard pickle file extensions in the scope for its vulnerability scan. An attacker could craft a malicious model that uses Pickle include a malicious pickle file with a non-standard file extension. Because the malicious pickle file inclusion is not considered as part of the scope of picklescan, the file would pass security checks and appear to be safe, when it could instead prove to be problematic. | |
| Title | picklescan - Security scanning bypass via non-standard file extensions | |
| Weaknesses | CWE-807 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Sonatype
Published:
Updated: 2025-03-04T11:43:39.089Z
Reserved: 2025-03-03T15:51:41.860Z
Link: CVE-2025-1889
Updated: 2025-03-03T20:06:25.812Z
Status : Analyzed
Published: 2025-03-03T19:15:34.560
Modified: 2025-03-05T20:16:46.363
Link: CVE-2025-1889
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA