Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Mark pickle module as dangerous #25

Merged
merged 4 commits into from
Mar 8, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion setup.cfg
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
[metadata]
name = picklescan
version = 0.0.13
version = 0.0.14
author = Matthieu Maitre
author_email = [email protected]
description = Security scanner detecting Python Pickle files performing suspicious actions
Expand Down
6 changes: 2 additions & 4 deletions src/picklescan/scanner.py
Original file line number Diff line number Diff line change
Expand Up @@ -114,15 +114,13 @@ def __str__(self) -> str:
"subprocess": "*",
"sys": "*",
"operator": "attrgetter", # Ex of code execution: operator.attrgetter("system")(__import__("os"))("echo pwned")
"pickle": "*",
"_pickle": "*",
mmaitre314 marked this conversation as resolved.
Show resolved Hide resolved
}

#
# TODO: handle methods loading other Pickle files (either mark as suspicious, or follow calls to scan other files [preventing infinite loops])
#
# pickle.loads()
# https://docs.python.org/3/library/pickle.html#pickle.loads
# pickle.load()
# https://docs.python.org/3/library/pickle.html#pickle.load
# numpy.load()
# https://numpy.org/doc/stable/reference/generated/numpy.load.html#numpy.load
# numpy.ctypeslib.load_library()
Expand Down
15 changes: 15 additions & 0 deletions tests/data/malicious13a.pkl
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
cpickle
loads
p0
(c_codecs
encode
p1
(VI12345\u000a.
p2
Vlatin1
p3
tp4
Rp5
tp6
Rp7
.
Binary file added tests/data/malicious13b.pkl
Binary file not shown.
29 changes: 25 additions & 4 deletions tests/test_scanner.py
Original file line number Diff line number Diff line change
Expand Up @@ -78,6 +78,11 @@ def __reduce__(self):
return sys.exit, (0,)


class Malicious13:
def __reduce__(self):
return pickle.loads, (b"I12345\n.",) # Loads the value 12345


class HTTPResponse:
def __init__(self, status, data=None):
self.status = status
Expand Down Expand Up @@ -296,6 +301,12 @@ def initialize_pickle_files():
initialize_pickle_file(f"{_root_path}/data/malicious7.pkl", Malicious6(), 4)
initialize_pickle_file(f"{_root_path}/data/malicious8.pkl", Malicious7(), 4)
initialize_pickle_file(f"{_root_path}/data/malicious9.pkl", Malicious8(), 4)
initialize_pickle_file(
f"{_root_path}/data/malicious13a.pkl", Malicious13(), 0
) # pickle module serialized as cpickle
initialize_pickle_file(
f"{_root_path}/data/malicious13b.pkl", Malicious13(), 4
) # pickle module serialized as _pickle

initialize_zip_file(
f"{_root_path}/data/malicious1.zip",
Expand Down Expand Up @@ -516,7 +527,7 @@ def test_scan_file_path():

def test_scan_directory_path():
sr = ScanResult(
[
globals=[
Global("builtins", "eval", SafetyLevel.Dangerous),
Global("httplib", "HTTPSConnection", SafetyLevel.Dangerous),
Global("collections", "OrderedDict", SafetyLevel.Innocuous),
Expand Down Expand Up @@ -550,10 +561,13 @@ def test_scan_directory_path():
Global("os", "system", SafetyLevel.Dangerous),
Global("operator", "attrgetter", SafetyLevel.Dangerous),
Global("builtins", "__import__", SafetyLevel.Suspicious),
Global("pickle", "loads", SafetyLevel.Dangerous),
Global("_pickle", "loads", SafetyLevel.Dangerous),
Global("_codecs", "encode", SafetyLevel.Suspicious),
],
24,
22,
19,
scanned_files=26,
issues_count=24,
infected_files=21,
)
compare_scan_results(scan_directory_path(f"{_root_path}/data/"), sr)

Expand Down Expand Up @@ -589,3 +603,10 @@ def test_main():
importlib.import_module("picklescan.__main__")
finally:
sys.argv = argv


def test_pickle_files():
with open(f"{_root_path}/data/malicious13a.pkl", "rb") as file:
assert pickle.load(file) == 12345
with open(f"{_root_path}/data/malicious13b.pkl", "rb") as file:
assert pickle.load(file) == 12345
Loading