漏洞编号:CVE-2020-13092
漏洞归属组件:scikit-learn
漏洞归属版本:1.11.0
CVSS V3.0分值:
Base Score: 9.8 CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞简述:
DISPUTED scikit-learn (aka sklearn) through 0.23.0 can unserialize and execute commands from an untrusted file that is passed to the joblib.load() function, if reduce makes an os.system call. NOTE: third parties dispute this issue because the joblib.load() function is documented as unsafe and it is the user's responsibility to use the function in a secure manner.
影响性分析说明:
原理分析:
openEuler评分:
受影响版本:
规避方案或消减措施:
Hey @yangli69393, Welcome to openEuler Community.
All of the projects in openEuler Community are maintained by @openeuler-ci-bot.
That means the developers can comment below every pull request or issue to trigger Bot Commands.
Please follow instructions at https://gitee.com/openeuler/community/blob/master/en/sig-infrastructure/command.md to find the details.
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。
cve-2020-13092:如果__reduce__进行os.system调用,则scikit-learn(也称为sklearn)通过0.23.0可以反序列化并执行传递给joblib.load()函数的不受信任文件中的命令。注意:第三方对此问题提出异议,因为joblib.load()函数被记录为不安全,并且用户有责任以安全方式使用该函数。分数为9.8分,显示涉及,但是没有patch。
登录 后才可以发表评论