ModelScan Bypass PoC โ telnetlib.Telnet
Security research for responsible disclosure via Huntr MFV program.
Vulnerability
telnetlib.Telnet is not in modelscan's unsafe_globals blocklist.
When a pickle file containing this global is scanned by modelscan, it reports "No issues found."
However, loading the file with pickle.loads() / torch.load() triggers immediate TCP/Telnet connection to attacker-controlled server on deserialization (SSRF/RCE via telnet protocol).
Impact
- Severity: HIGH
- Effect: immediate TCP/Telnet connection to attacker-controlled server on deserialization (SSRF/RCE via telnet protocol)
- Bypass class: Module blocklist gap
Reproduction
pip install modelscan
modelscan scan -p bypass_poc.pkl
# Output: "No issues found!"
Inference Providers NEW
This model isn't deployed by any Inference Provider. ๐ Ask for provider support