ModelScan Bypass PoC โ poplib.POP3
Security research for responsible disclosure via Huntr MFV program.
Vulnerability
poplib.POP3 is not in modelscan's unsafe_globals blocklist.
When a pickle file containing this global is scanned by modelscan, it reports "No issues found."
However, loading the file with pickle.loads() / torch.load() triggers immediate TCP connection to attacker-controlled POP3 server on deserialization (SSRF/data exfiltration).
Impact
- Severity: HIGH
- Effect: immediate TCP connection to attacker-controlled POP3 server on deserialization (SSRF/data exfiltration)
- Bypass class: Module blocklist gap
Reproduction
pip install modelscan
modelscan scan -p bypass_poc.pkl
# Output: "No issues found!"
Inference Providers NEW
This model isn't deployed by any Inference Provider. ๐ Ask for provider support