You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The restricted_loads function at api/utils/init.py#L215 is still vulnerable leading via code execution.
The main reson is that numpy module has a numpy.f2py.diagnose.run_command function directly execute commands, but the restricted_loads function allows users import functions in module numpy.
Expected behavior
No response
Steps to reproduce
ragflow_patch.py
importbuiltinsimportioimportpicklesafe_module= {
'numpy',
'rag_flow'
}
classRestrictedUnpickler(pickle.Unpickler):
deffind_class(self, module, name):
importimportlibifmodule.split('.')[0] insafe_module:
_module=importlib.import_module(module)
returngetattr(_module, name)
# Forbid everything else.raisepickle.UnpicklingError("global '%s.%s' is forbidden"%
(module, name))
defrestricted_loads(src):
"""Helper function analogous to pickle.loads()."""returnRestrictedUnpickler(io.BytesIO(src)).load()
### What problem does this PR solve?
The restricted_loads function at
[api/utils/init.py#L215](https://github.com/infiniflow/ragflow/blob/main/api/utils/__init__.py#L215)
is still vulnerable leading via code execution. The main reson is that
numpy module has a numpy.f2py.diagnose.run_command function directly
execute commands, but the restricted_loads function allows users import
functions in module numpy.
### Additional Details
[https://github.com/infiniflow/ragflow/issues/1240](https://github.com/infiniflow/ragflow/issues/1240)
### Type of change
- [ ] Bug Fix (non-breaking change which fixes an issue)
- [ ] New Feature (non-breaking change which adds functionality)
- [ ] Documentation Update
- [ ] Refactoring
- [ ] Performance Improvement
- [ ] Other (please describe):
Is there an existing issue for the same bug?
Branch name
main
Commit ID
fd7fcb5
Other environment information
No response
Actual behavior
The restricted_loads function at api/utils/init.py#L215 is still vulnerable leading via code execution.
The main reson is that numpy module has a numpy.f2py.diagnose.run_command function directly execute commands, but the restricted_loads function allows users import functions in module numpy.
Expected behavior
No response
Steps to reproduce
ragflow_patch.py
Then, PoC.py
Result
Additional information
How to prevent?
Strictly filter the module and name before calling with getattr
The text was updated successfully, but these errors were encountered: