pandas through 1.0.3 can unserialize and execute commands from an untrusted file that is passed to the read_pickle() function, if __reduce__ makes an os.system call. NOTE: third parties dispute this issue because the read_pickle() function is documented as unsafe and it is the user's responsibility to use the function in a secure manner
References
Link | Resource |
---|---|
https://github.com/0FuzzingQ/vuln/blob/master/pandas%20unserialize.md | Exploit Third Party Advisory |
https://pandas.pydata.org/pandas-docs/stable/reference/api/pandas.read_pickle.html | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-05-15T18:41:48
Updated: 2020-05-18T11:16:52
Reserved: 2020-05-15T00:00:00
Link: CVE-2020-13091
JSON object: View
NVD Information
Status : Modified
Published: 2020-05-15T19:15:12.167
Modified: 2024-05-17T01:42:19.037
Link: CVE-2020-13091
JSON object: View
Redhat Information
No data.
CWE