-
Notifications
You must be signed in to change notification settings - Fork 17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2022-31265 Mitigation #22
Comments
Well, I knew about that vulnerability for a couple of years and never saw
anyone who tried to use it in the wild.
I don't think that we need detection in this library, maybe restricting
some globals
<https://docs.python.org/3/library/pickle.html#restricting-globals> like
exec/eval and wrapping imports will be enough. Or maybe WG just finally
removes all pickles from client-server protocol (anyone searched for the
same vulnerability in server-side methods/props btw? :))
вс, 29 мая 2022 г. в 14:22, Sakura Isayeki ***@***.***>:
… Could a mitigation or detection system be implemented in the replays
unpacker, for CVE-2022-31265
<https://www.cve.org/CVERecord?id=CVE-2022-31265> ?
This vulnerability is currently affecting the WOWS Community, which has no
way of mitigating against it from the game client. However could we get
some detection for the replays_unpack library?
@imkindaprogrammermyself <https://github.com/imkindaprogrammermyself>
already developed a detection solution, available here:
https://github.com/imkindaprogrammermyself/pickle-cndm.
If you need to discuss this further, do feel free to contact either of us.
Here's my Discord: Sakura#9999
—
Reply to this email directly, view it on GitHub
<#22>, or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ACCGX6EQVZT34UZEU7BTGUTVMNHQXANCNFSM5XIAUWBQ>
.
You are receiving this because you are subscribed to this thread.Message
ID: ***@***.***>
--
С уважением, Александр.
|
Yes. A custom unpickler with whitelist would suffice but it wont catch everything unless you check every pickle in the replay file which is what I have done in this repo. |
not a problem actually, just need some safe_pickle.py used in all places in library and some BIG WARNING for anyone who will use this library saying not to use pickle directly in their scripts |
@SakuraIsayeki @imkindaprogrammermyself don't you have a code which creates and injects pickle with RCE into replays by any chance? I believe that WG did not fix this CVE properly and want to check that. |
We do, as a matter of fact. Contact us on Discord, and we'll send you what we've got. |
Hmm... that's concerning. |
Could a mitigation or detection system be implemented in the replays unpacker, for CVE-2022-31265 ?
This vulnerability is currently affecting the WOWS Community, which has no way of mitigating against it from the game client. However could we get some detection for the replays_unpack library?
@imkindaprogrammermyself already developed a detection solution, available here: https://github.com/imkindaprogrammermyself/pickle-cndm.
If you need to discuss this further, do feel free to contact either of us. Here's my Discord: Sakura#9999
The text was updated successfully, but these errors were encountered: