** DISPUTED ** scikit-learn (aka sklearn) through 0.23.0 can unserialize and execute commands from an untrusted file that is passed to the joblib.load() function, if __reduce__ makes an os.system call. NOTE: third parties dispute this issue because the joblib.load() function is documented as unsafe and it is the user's responsibility to use the function in a secure manner.
References
Link | Resource |
---|---|
https://github.com/0FuzzingQ/vuln/blob/master/sklearn%20unserialize.md | Exploit Third Party Advisory |
https://scikit-learn.org/stable/modules/model_persistence.html#security-maintainability-limitations | Third Party Advisory |
Configurations
Information
Published : 2020-05-15 12:15
Updated : 2020-05-19 12:05
NVD link : CVE-2020-13092
Mitre link : CVE-2020-13092
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
scikit-learn
- scikit-learn