Remote Code Execution via Unsafe Usage of Pickle in NumPy

Remote Code Execution via Unsafe Usage of Pickle in NumPy

CVE-2019-6446 · HIGH Severity

AV:N/AC:L/AU:N/C:P/I:P/A:P

An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is a behavior that might have legitimate applications in (for example) loading serialized Python object arrays from trusted and authenticated sources

Learn more about our Web Application Penetration Testing UK.