You need to agree to share your contact information to access this model

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this model content.

Modelscan Bypass PoC: poplib.POP3 SSRF

Security Research — Responsible Disclosure

This model file demonstrates a modelscan bypass using poplib.POP3. The POP3 constructor connects to the specified host immediately on construction, enabling Server-Side Request Forgery (SSRF) attacks.

Vulnerability

  • Module: poplib.POP3 (Python stdlib)
  • Type: SSRF (CWE-918)
  • Impact: Network access to attacker-controlled server on model load
  • Modelscan result: "No issues found" on both .pkl and pytorch_model.bin

How it works

poplib.POP3(host) connects to the host immediately when the constructor is called. This module is NOT in modelscan's unsafe_globals blocklist, so the pickle passes scanning but executes a network connection when loaded with pickle.load() or torch.load().

Downloads last month

-

Downloads are not tracked for this model. How to track
Inference Providers NEW
This model isn't deployed by any Inference Provider. 🙋 Ask for provider support