Author christian.heimes
Recipients Iman Sharafaldin, christian.heimes, serhiy.storchaka, vstinner
Date 2020-07-06.15:26:27
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1594049188.02.0.661657877377.issue41208@roundup.psfhosted.org>
In-reply-to
Content
That line in Ray Project is a potential arbitrary code execution vulnerability. If an attacker is able to inject a custom pickle stream, then they can easily take over the service. Please report the issue to the project. It might be a simple score of a CVE for you.

Python has several functions and modules that are not designed to deal with malicious data. They are documented as insecure. The pickle format was created 25 years ago. It's a useful serialization format but it's inherently insecure.

tl;dr we welcome any and all work to make Python more secure, but we cannot make very part of the interpreter secure. Pickle and marshal are two modules that you should ignore.
History
Date User Action Args
2020-07-06 15:26:28christian.heimessetrecipients: + christian.heimes, vstinner, serhiy.storchaka, Iman Sharafaldin
2020-07-06 15:26:28christian.heimessetmessageid: <1594049188.02.0.661657877377.issue41208@roundup.psfhosted.org>
2020-07-06 15:26:28christian.heimeslinkissue41208 messages
2020-07-06 15:26:27christian.heimescreate