blog.nelhage.com/2011/03/exploiting-pickle

Preview meta tags from the blog.nelhage.com website.

Linked Hostnames

6

Search Engine Appearance

Google

https://blog.nelhage.com/2011/03/exploiting-pickle

Exploiting misuse of Python's "pickle"

If you program in Python, you’re probably familiar with the pickle serialization library, which provides for efficient binary serialization and loading of Python datatypes. Hopefully, you’re also familiar with the warning printed prominently near the start of pickle’s documentation: Warning: The pickle module is not intended to be secure against erroneous or maliciously constructed data. Never unpickle data received from an untrusted or unauthenticated source. Recently, however, I stumbled upon a project that was accepting and unpacking untrusted pickles over the network, and a poll of some friends revealed that few of them were aware of just how easy it is to exploit a service that does this.



Bing

Exploiting misuse of Python's "pickle"

https://blog.nelhage.com/2011/03/exploiting-pickle

If you program in Python, you’re probably familiar with the pickle serialization library, which provides for efficient binary serialization and loading of Python datatypes. Hopefully, you’re also familiar with the warning printed prominently near the start of pickle’s documentation: Warning: The pickle module is not intended to be secure against erroneous or maliciously constructed data. Never unpickle data received from an untrusted or unauthenticated source. Recently, however, I stumbled upon a project that was accepting and unpacking untrusted pickles over the network, and a poll of some friends revealed that few of them were aware of just how easy it is to exploit a service that does this.



DuckDuckGo

https://blog.nelhage.com/2011/03/exploiting-pickle

Exploiting misuse of Python's "pickle"

If you program in Python, you’re probably familiar with the pickle serialization library, which provides for efficient binary serialization and loading of Python datatypes. Hopefully, you’re also familiar with the warning printed prominently near the start of pickle’s documentation: Warning: The pickle module is not intended to be secure against erroneous or maliciously constructed data. Never unpickle data received from an untrusted or unauthenticated source. Recently, however, I stumbled upon a project that was accepting and unpacking untrusted pickles over the network, and a poll of some friends revealed that few of them were aware of just how easy it is to exploit a service that does this.

  • General Meta Tags

    10
    • title
      Exploiting misuse of Python's "pickle" - Made of Bugs
    • charset
      utf-8
    • author
      Nelson Elhage
    • HandheldFriendly
      True
    • MobileOptimized
      320
  • Open Graph Meta Tags

    6
    • og:url
      https://blog.nelhage.com/2011/03/exploiting-pickle/
    • og:site_name
      Made of Bugs
    • og:title
      Exploiting misuse of Python's "pickle"
    • og:description
      If you program in Python, you’re probably familiar with the pickle serialization library, which provides for efficient binary serialization and loading of Python datatypes. Hopefully, you’re also familiar with the warning printed prominently near the start of pickle’s documentation: Warning: The pickle module is not intended to be secure against erroneous or maliciously constructed data. Never unpickle data received from an untrusted or unauthenticated source. Recently, however, I stumbled upon a project that was accepting and unpacking untrusted pickles over the network, and a poll of some friends revealed that few of them were aware of just how easy it is to exploit a service that does this.
    • US country flagog:locale
      en_us
  • Link Tags

    5
    • alternate
      /atom.xml
    • canonical
      https://blog.nelhage.com/2011/03/exploiting-pickle/
    • icon
      /favicon.png
    • stylesheet
      /css/screen.cb04a9aa990d23e9df1263eae2a975688090c919b2e39168b989799c744ec804.css
    • stylesheet
      /css/fonts.b428aca6651515b69efbc3270422da34019189b3e6682f16b10e4455d5834152.css

Links

12