First published: Fri May 15 2020(Updated: )
** DISPUTED ** scikit-learn (aka sklearn) through 0.23.0 can unserialize and execute commands from an untrusted file that is passed to the joblib.load() function, if __reduce__ makes an os.system call. NOTE: third parties dispute this issue because the joblib.load() function is documented as unsafe and it is the user's responsibility to use the function in a secure manner.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/scikit-learn | <=0.23.0 | |
Scikit-learn | <=0.23.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13092 is considered a medium severity vulnerability due to the potential for remote code execution.
To mitigate CVE-2020-13092, upgrade to scikit-learn version 0.24.0 or later where this issue is resolved.
CVE-2020-13092 affects scikit-learn versions up to and including 0.23.0.
CVE-2020-13092 involves the unserialization of untrusted files through the joblib.load() function which can lead to the execution of arbitrary commands.
CVE-2020-13092 is disputed by some parties who claim that the joblib.load() function is documented as unsafe.