Modelscan Bypass PoC: poplib.POP3 SSRF
Security Research — Responsible Disclosure
This model file demonstrates a modelscan bypass using poplib.POP3.
The POP3 constructor connects to the specified host immediately on construction,
enabling Server-Side Request Forgery (SSRF) attacks.
Vulnerability
- Module:
poplib.POP3(Python stdlib) - Type: SSRF (CWE-918)
- Impact: Network access to attacker-controlled server on model load
- Modelscan result: "No issues found" on both .pkl and pytorch_model.bin
How it works
poplib.POP3(host) connects to the host immediately when the constructor is called.
This module is NOT in modelscan's unsafe_globals blocklist, so the pickle passes scanning
but executes a network connection when loaded with pickle.load() or torch.load().
Inference Providers NEW
This model isn't deployed by any Inference Provider. 🙋 Ask for provider support