manja316's picture
Add README
62d63fa verified
---
tags:
- security-research
- modelscan-bypass
license: mit
---
# Modelscan Bypass PoC: http.server.HTTPServer port binding backdoor
**Security research only.**
## Summary
Creates an HTTP server bound to 0.0.0.0:8888 during pickle.load().
http.server is not in modelscan's unsafe_globals blocklist.
Attacker can serve content or create a reverse shell listener.
## Reproduction
```bash
pip install modelscan
modelscan scan -p pytorch_model.bin # No issues found
python3 -c "import pickle; pickle.load(open('pytorch_model.bin', 'rb'))" # Executes
```
## Affected: modelscan 0.7.6 (latest)
## Disclosure: Submitted via Huntr.