metadata
tags:
- security-research
- modelscan-bypass
license: mit
Modelscan Bypass PoC: http.server.HTTPServer port binding backdoor
Security research only.
Summary
Creates an HTTP server bound to 0.0.0.0:8888 during pickle.load(). http.server is not in modelscan's unsafe_globals blocklist. Attacker can serve content or create a reverse shell listener.
Reproduction
pip install modelscan
modelscan scan -p pytorch_model.bin # No issues found
python3 -c "import pickle; pickle.load(open('pytorch_model.bin', 'rb'))" # Executes