Closed huntr-helper closed 3 years ago
Why this fix is not merging @JeiKeiLim is there any issues Thanks
Why this fix is not merging @JeiKeiLim is there any issues Thanks
Github Action is required to merge but I forgot to add PR trigger. I'm going to close and re-open this PR to see if GitHub Action runs.
Why this fix is not merging @JeiKeiLim is there any issues Thanks
Github Action is required to merge but I forgot to add PR trigger. I'm going to close and re-open this PR to see if GitHub Action runs.
Github Action is running now. I will merge when it's done!
I hope everything will be okay thanks @JeiKeiLim
I hope everything will be okay thanks @JeiKeiLim
Thank you for the PR!
@Anon-Artist (https://huntr.dev/users/Anon-Artist) has fixed a potential Arbitrary Code Execution vulnerability in your repository π¨. For more information, visit our website (https://huntr.dev/) or click the bounty URL below...
Q | A Version Affected | * Bug Fix | YES Original Pull Request | https://github.com/418sec/kindle/pull/1 Vulnerability README | https://github.com/418sec/huntr/blob/master/bounties/pip/kindle/1/README.md
User Comments:
π Metadata *
Kindle
is an easy model build package for PyTorch. Building a deep learning model became so simple that almost all model can be made by copy and paste from other existing model codes, which is vulnerable toArbitary Code Execution
.Bounty URL: https://www.huntr.dev/bounties/1-pip-kindle
βοΈ Description *
Vulnerable to YAML deserialization attack caused by unsafe loading.
π» Technical Description *
Fixed by avoiding unsafe loader.
π Proof of Concept (PoC) *
Installation
Run exploit.py
python3 exploit.py
xcalc will pop up.
π₯ Proof of Fix (PoF) *
After fix Arbitary Code execution will never happen.
π User Acceptance Testing (UAT)
After fix functionality is unaffected.
π Relates to...
https://www.huntr.dev/bounties/1-pip-kindle