Description
scikit-learn (aka sklearn) through 0.23.0 can unserialize and execute commands from an untrusted file that is passed to the joblib.load() function, if __reduce__ makes an os.system call. NOTE: third parties dispute this issue because the joblib.load() function is documented as unsafe and it is the user's responsibility to use the function in a secure manner
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jjw5-xxj6-pcv5 | scikit-learn Deserialization of Untrusted Data |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T12:11:18.980Z
Reserved: 2020-05-15T00:00:00.000Z
Link: CVE-2020-13092
No data.
Status : Modified
Published: 2020-05-15T19:15:12.277
Modified: 2024-11-21T05:00:39.113
Link: CVE-2020-13092
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA