pandas through 1.0.3 can unserialize and execute commands from an untrusted file that is passed to the read_pickle() function, if reduce makes an os.system call. NOTE: third parties dispute this issue because the read_pickle() function is documented as unsafe and it is the users responsibility to use the function in a secure manner
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Pandas | Numfocus | * | 1.0.3 (including) |
Pandas | Ubuntu | bionic | * |
Pandas | Ubuntu | eoan | * |
Pandas | Ubuntu | groovy | * |
Pandas | Ubuntu | hirsute | * |
Pandas | Ubuntu | impish | * |
Pandas | Ubuntu | kinetic | * |
Pandas | Ubuntu | lunar | * |
Pandas | Ubuntu | mantic | * |
Pandas | Ubuntu | trusty | * |
Pandas | Ubuntu | xenial | * |