ghsa-5m22-cfq9-86x6
Vulnerability from github
Published
2023-10-13 19:25
Modified
2023-10-13 21:48
Severity ?
Summary
Pickle serialization vulnerable to Deserialization of Untrusted Data
Details
What
We are using pickle as default serialization module but that has known security issues (see e.g. https://medium.com/ochrona/python-pickle-is-notoriously-insecure-d6651f1974c9).
In summary, it is not advisable to open Pickles that you create yourself locally. In vantage6, algorithms use pickles to send aggregated data around and to pack algorithm input or output. All of the Python algorithms that use the wrappers with default serialization are therefore vulnerable to this issue.
Solution: we should use JSON instead
Impact
All users of vantage6 that post tasks with algorithms that use the default serialization. The default serialization is used by default with all algorithm wrappers.
Patches
Not yet
Workarounds
Specify JSON serialization
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "vantage6" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "4.0.2" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2023-23930" ], "database_specific": { "cwe_ids": [ "CWE-502" ], "github_reviewed": true, "github_reviewed_at": "2023-10-13T19:25:39Z", "nvd_published_at": "2023-10-11T18:15:10Z", "severity": "HIGH" }, "details": "### What\nWe are using pickle as default serialization module but that has known security issues (see e.g. https://medium.com/ochrona/python-pickle-is-notoriously-insecure-d6651f1974c9). \n\nIn summary, it is not advisable to open Pickles that you create yourself locally. In vantage6, algorithms use pickles to send aggregated data around and to pack algorithm input or output. All of the Python algorithms that use the wrappers with default serialization are therefore vulnerable to this issue.\n\nSolution: we should use JSON instead\n\n### Impact\nAll users of vantage6 that post tasks with algorithms that use the default serialization. The default serialization is used by default with all algorithm wrappers.\n\n### Patches\nNot yet\n\n### Workarounds\nSpecify JSON serialization\n\n", "id": "GHSA-5m22-cfq9-86x6", "modified": "2023-10-13T21:48:51Z", "published": "2023-10-13T19:25:39Z", "references": [ { "type": "WEB", "url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-5m22-cfq9-86x6" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23930" }, { "type": "WEB", "url": "https://github.com/vantage6/vantage6/commit/e62f03bacf2247bd59eed217e2e7338c3a01a5f0" }, { "type": "WEB", "url": "https://github.com/pypa/advisory-database/tree/main/vulns/vantage6/PYSEC-2023-196.yaml" }, { "type": "PACKAGE", "url": "https://github.com/vantage6/vantage6" }, { "type": "WEB", "url": "https://github.com/vantage6/vantage6/blob/0682c4288f43fee5bcc72dc448cdd99bd7e57f76/docs/release_notes.rst#400" }, { "type": "WEB", "url": "https://medium.com/ochrona/python-pickle-is-notoriously-insecure-d6651f1974c9" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "Pickle serialization vulnerable to Deserialization of Untrusted Data" }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.