CVE-2025-56005 (CNNVD-202601-3192)
中文标题:
PLY 安全漏洞
英文标题:
An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Exec...
漏洞描述
中文描述:
PLY是B07个人开发者的一个Python库。 PLY 3.11版本存在安全漏洞,该漏洞源于yacc函数的picklefile参数未经验证地反序列化pickle文件,可能导致远程代码执行。
英文描述:
An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Execution (RCE) via the `picklefile` parameter in the `yacc()` function. This parameter accepts a `.pkl` file that is deserialized with `pickle.load()` without validation. Because `pickle` allows execution of embedded code via `__reduce__()`, an attacker can achieve code execution by passing a malicious pickle file. The parameter is not mentioned in official documentation or the GitHub repository, yet it is active in the PyPI version. This introduces a stealthy backdoor and persistence risk.
CWE类型:
标签:
受影响产品
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.1 (adp)
CRITICALCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-56005 |
2026-01-21 02:30:59 | 2026-01-20 22:00:07 |
| NVD | nvd_CVE-2025-56005 |
2026-01-21 02:00:05 | 2026-01-20 22:00:14 |
| CNNVD | cnnvd_CNNVD-202601-3192 |
2026-01-26 02:10:03 | 2026-01-25 18:11:54 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 3 -> 6
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202601-3192
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- references_count: 1 -> 3
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']