CVE-2020-13092
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
scikit-learn (aka sklearn) through 0.23.0 can unserialize and execute commands from an untrusted file that is passed to the joblib.load() function, if __reduce__ makes an os.system call. NOTE: third parties dispute this issue because the joblib.load() function is documented as unsafe and it is the user's responsibility to use the function in a secure manner
** EN DISPUTA ** scikit-learn (también se conoce como sklearn) versiones hasta 0.23.0, puede deserializar y ejecutar comandos desde un archivo no confiable que es pasado hacia la función joblib.load(), si __reduce__ realiza una llamada os.system. NOTA: terceros disputan este problema porque la función joblib.load () está documentada como insegura y es responsabilidad del usuario usar la función de manera segura.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-05-15 CVE Reserved
- 2020-05-15 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-502: Deserialization of Untrusted Data
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://scikit-learn.org/stable/modules/model_persistence.html#security-maintainability-limitations | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/0FuzzingQ/vuln/blob/master/sklearn%20unserialize.md | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Scikit-learn Search vendor "Scikit-learn" | Scikit-learn Search vendor "Scikit-learn" for product "Scikit-learn" | <= 0.23.0 Search vendor "Scikit-learn" for product "Scikit-learn" and version " <= 0.23.0" | - |
Affected
|