You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I noticed that there is a module named load_params that passes user input directly into pickle , which allows an attacker to execute system commands with insecure deserialization attack on the victim’s system.
as a start. But a bigger refactor is needed to bubble up this kind of logic into load_params, since the target state needs to be provided AOT when loading the params.
The flax serializer has a similar requirement, the target needs to be defined AOT. The right thing to do is to perhaps nix model.load_params and save_params altogether, and rely entirely on a flax/nnx/orbax serializer (along with a model config to generate the target pytree).
Happy to review any PRs if someone wants to take a look.
I noticed that there is a module named
load_params
that passes user input directly into pickle , which allows an attacker to execute system commands with insecure deserialization attack on the victim’s system.Vulnerable Function
brax/brax/io/model.py
Line 22 in 69637a3
Exploit Code (Attacker Side):
Exploit Code (Victim Side):
The text was updated successfully, but these errors were encountered: