```md ### 关键信息 #### CVE-2025-69872: DiskCache Unsafe Pickle Deserialization - **CVE ID**: CVE-2025-69872 - **Vendor**: python-diskcache project - **Product**: DiskCache (python-diskcache) - **Affected Version**: <= 5.6.3 (all versions) - **Vulnerability Type**: CWE-502: Deserialization of Untrusted Data - **CVSS 3.1**: 7.3 (High) — AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H - **Attack Type**: Local - **Created**: 2026-02-11 - **Last Modified**: 2026-02-11 #### Description DiskCache (python-diskcache) through version 5.6.3 uses Python’s pickle module as its default serialization method. This makes it vulnerable to deserialization attacks. #### Attack Flow The attack follows a poison-and-trigger pattern: 1. Attacker writes a malicious pickle payload to the cache. 2. Victim reads from cache with `cache.get()` which triggers `pickle.load()` and executes arbitrary code. #### Impact - **Arbitrary Code Execution**: Attacker gains full code execution in the victim's process. - **Data Exfiltration**: Extraction of sensitive data, secrets, and credentials. - **Lateral Movement**: Use as a pivot point to attack other services. #### Recommended Remediation - Switch to JSON serialization. - Restrict cache directory permissions. ```