picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes it to crash when attempting to extract and scan PyTorch model archives. By modifying the filename in the ZIP header while keeping the original filename in the directory listing, an attacker can make PickleScan raise a BadZipFile error. However, PyTorch's more forgiving ZIP implementation still allows the model to be loaded, enabling malicious payloads to bypass detection.
Metrics
Affected Vendors & Products
References
History
Wed, 19 Mar 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mmaitre314
Mmaitre314 picklescan |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:mmaitre314:picklescan:*:*:*:*:*:*:*:* | |
Vendors & Products |
Mmaitre314
Mmaitre314 picklescan |
|
Metrics |
cvssV3_1
|
Mon, 10 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 10 Mar 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes it to crash when attempting to extract and scan PyTorch model archives. By modifying the filename in the ZIP header while keeping the original filename in the directory listing, an attacker can make PickleScan raise a BadZipFile error. However, PyTorch's more forgiving ZIP implementation still allows the model to be loaded, enabling malicious payloads to bypass detection. | |
Title | picklescan ZIP archive manipulation attack leads to crash | |
Weaknesses | CWE-345 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Sonatype
Published:
Updated: 2025-03-10T12:09:36.612Z
Reserved: 2025-03-04T12:59:33.809Z
Link: CVE-2025-1944

Updated: 2025-03-10T12:09:21.792Z

Status : Analyzed
Published: 2025-03-10T12:15:10.967
Modified: 2025-03-19T16:11:29.113
Link: CVE-2025-1944

No data.