Pain Pickle: Bypassing Python Restricted Unpickler for Automatic Exploit Generation | IEEE Conference Publication | IEEE Xplore

Pain Pickle: Bypassing Python Restricted Unpickler for Automatic Exploit Generation


Abstract:

Pickle is a built-in library in Python that can serialize and deserialize Python objects and data structures. However, the process of pickle deserialization has been conf...Show More

Abstract:

Pickle is a built-in library in Python that can serialize and deserialize Python objects and data structures. However, the process of pickle deserialization has been confirmed as a hazardous operation. Marco Slaviero uncovered its dangerous vulnerability and proposed exploitation methods in BlackHat 2011. As a result, corresponding defense methods have also been generated. Restricting Globals was proposed in the official Python documentation as a defensive approach.We find that defense implementations are incorrect in some cases. Therefore, we conducted a large-scale analysis of 7543 open-source Python projects with more than 100 stars to find that 36 projects have implemented defense strategies. Among them, nine projects were not correctly implemented. Furthermore, we investigated the root causes of their failures for automatic exploit generation from these projects.
Date of Conference: 05-09 December 2022
Date Added to IEEE Xplore: 20 March 2023
ISBN Information:

ISSN Information:

Conference Location: Guangzhou, China

Funding Agency:


Contact IEEE to Subscribe

References

References is not available for this document.