9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.01 Low
EPSS
Percentile
83.4%
DISPUTED pandas through 1.0.3 can unserialize and execute commands
from an untrusted file that is passed to the read_pickle() function, if
reduce makes an os.system call. NOTE: third parties dispute this issue
because the read_pickle() function is documented as unsafe and it is the
user’s responsibility to use the function in a secure manner.
Author | Note |
---|---|
ccdm94 | no patch seems to be available considering that the vulnerability is disputed. |
github.com/0FuzzingQ/vuln/blob/master/pandas%20unserialize.md
launchpad.net/bugs/cve/CVE-2020-13091
nvd.nist.gov/vuln/detail/CVE-2020-13091
pandas.pydata.org/pandas-docs/stable/reference/api/pandas.read_pickle.html
security-tracker.debian.org/tracker/CVE-2020-13091
www.cve.org/CVERecord?id=CVE-2020-13091
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.01 Low
EPSS
Percentile
83.4%