CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



GHSA-84R2-JW7C-4R5Q
9.8

Pickle Me This: How a 'Safe' Scanner Became an RCE Delivery System

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 3, 2026·7 min read·3 visits

PoC Available

Executive Summary (TL;DR)

A security tool named `picklescan`, designed to find dangerous Python pickle files, had a critical command injection flaw. When scanning a ZIP file, it used an unsanitized internal filename to build a shell command, allowing an attacker who controls the filename to achieve remote code execution. The fix was a one-line change to properly quote the filename. Anyone using `picklescan` versions before 1.0.1 should upgrade immediately.

The picklescan library, a tool designed to safely inspect Python pickle files for malicious content without the risks of deserialization, ironically contained a critical command injection vulnerability. By crafting a malicious ZIP archive with a specially named file, an attacker could execute arbitrary commands on the machine running the scan. This vulnerability turns a security tool into a weapon, achieving remote code execution by exploiting the very mechanism meant to provide safety.

Fix Analysis (1)

Technical Appendix

CVSS Score
9.8/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Systems

Python applications and services that use the picklescan library versions prior to 1.0.1 to scan ZIP archives.

Affected Versions Detail

Product
Affected Versions
Fixed Version
picklescan
mmaitre314
< 1.0.11.0.1
AttributeDetail
CWE IDCWE-78
CWE NameImproper Neutralization of Special Elements used in a Command ('Command Injection')
Attack VectorNetwork / File Upload
CVSS 3.1 Score9.8 (Critical)
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
ImpactRemote Code Execution
Exploit StatusProof-of-Concept Available
KEV StatusNot Listed

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1059.004Command and Scripting Interpreter: Unix Shell
Execution
CWE-78
Improper Neutralization of Special Elements used in a Command ('Command Injection')

References & Sources

  • [1]GitHub Advisory: Command injection in picklescan
  • [2]Fix Commit for GHSA-84r2-jw7c-4r5q
  • [3]CWE-78: Improper Neutralization of Special Elements used in a Command ('Command Injection')

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.