Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Fickling has a bypass via runpy.run_path() and runpy.run_module()
Vulnerability Description
Fickling is a Python pickling decompiler and static analyzer. Fickling versions up to and including 0.1.6 do not treat Python’s runpy module as unsafe. Because of this, a malicious pickle that uses runpy.run_path() or runpy.run_module() is classified as SUSPICIOUS instead of OVERTLY_MALICIOUS. If a user relies on Fickling’s output to decide whether a pickle is safe to deserialize, this misclassification can lead them to execute attacker-controlled code on their system. This affects any workflow or product that uses Fickling as a security gate for pickle deserialization. This issue has been patched in version 0.1.7.
CVSS Information
N/A
Vulnerability Type
不完整的黑名单
Vulnerability Title
Fickling 代码问题漏洞
Vulnerability Description
Fickling是Trail of Bits开源的一个Python的反编译器和静态分析器。 Fickling 0.1.6及之前版本存在代码问题漏洞,该漏洞源于未将runpy模块标记为不安全,可能导致执行攻击者控制的代码。
CVSS Information
N/A
Vulnerability Type
N/A