CVE-2026-22606 (CNNVD-202601-1766)
中文标题:
Fickling 代码问题漏洞
英文标题:
Fickling has a bypass via runpy.run_path() and runpy.run_module()
漏洞描述
中文描述:
Fickling是Trail of Bits开源的一个Python的反编译器和静态分析器。 Fickling 0.1.6及之前版本存在代码问题漏洞,该漏洞源于未将runpy模块标记为不安全,可能导致执行攻击者控制的代码。
英文描述:
Fickling is a Python pickling decompiler and static analyzer. Fickling versions up to and including 0.1.6 do not treat Python’s runpy module as unsafe. Because of this, a malicious pickle that uses runpy.run_path() or runpy.run_module() is classified as SUSPICIOUS instead of OVERTLY_MALICIOUS. If a user relies on Fickling’s output to decide whether a pickle is safe to deserialize, this misclassification can lead them to execute attacker-controlled code on their system. This affects any workflow or product that uses Fickling as a security gate for pickle deserialization. This issue has been patched in version 0.1.7.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| trailofbits | fickling | < 0.1.7 | - | - |
cpe:2.3:a:trailofbits:fickling:<_0.1.7:*:*:*:*:*:*:*
|
| trailofbits | fickling | * | - | - |
cpe:2.3:a:trailofbits:fickling:*:*:*:*:*:python:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
CVSS评分详情
4.0 (cna)
HIGHCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2026-22606 |
2026-01-10 04:00:23 | 2026-01-12 02:12:39 |
| NVD | nvd_CVE-2026-22606 |
2026-01-11 03:00:07 | 2026-01-12 02:28:17 |
| CNNVD | cnnvd_CNNVD-202601-1766 |
2026-01-13 07:38:23 | 2026-01-13 07:41:17 |
版本与语言
安全公告
变更历史
查看详细变更
- affected_products_count: 1 -> 2
查看详细变更
- vulnerability_type: 未提取 -> 代码问题
- cnnvd_id: 未提取 -> CNNVD-202601-1766
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']