PoC: Joblib Path Traversal via NDArrayWrapper
Security vulnerability PoC for responsible disclosure via huntr.com.
Vulnerability
NDArrayWrapper.read() uses os.path.join(unpickler._dirname, self.filename) with no validation.
Absolute paths in self.filename bypass the directory, enabling arbitrary file read.
File: joblib/numpy_pickle_compat.py, lines 97-111
Files
malicious_path_traversal.joblibโ Crafted joblib filepoc_joblib_path_traversal.pyโ Full PoC script
Researcher
Ryan โ Fan Pier Labs (ryan@fanpierlabs.com)
Inference Providers NEW
This model isn't deployed by any Inference Provider. ๐ Ask for provider support