Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2022-31265 Mitigation #22

Open
SakuraIsayeki opened this issue May 29, 2022 · 6 comments
Open

CVE-2022-31265 Mitigation #22

SakuraIsayeki opened this issue May 29, 2022 · 6 comments

Comments

@SakuraIsayeki
Copy link

Could a mitigation or detection system be implemented in the replays unpacker, for CVE-2022-31265 ?

This vulnerability is currently affecting the WOWS Community, which has no way of mitigating against it from the game client. However could we get some detection for the replays_unpack library?

@imkindaprogrammermyself already developed a detection solution, available here: https://github.com/imkindaprogrammermyself/pickle-cndm.

If you need to discuss this further, do feel free to contact either of us. Here's my Discord: Sakura#9999

@Monstrofil
Copy link
Owner

Monstrofil commented May 29, 2022 via email

@imkindaprogrammermyself
Copy link
Contributor

Yes. A custom unpickler with whitelist would suffice but it wont catch everything unless you check every pickle in the replay file which is what I have done in this repo.

@Monstrofil
Copy link
Owner

Monstrofil commented May 29, 2022

it wont catch everything unless you check every pickle

not a problem actually, just need some safe_pickle.py used in all places in library and some BIG WARNING for anyone who will use this library saying not to use pickle directly in their scripts

@Monstrofil
Copy link
Owner

@SakuraIsayeki @imkindaprogrammermyself don't you have a code which creates and injects pickle with RCE into replays by any chance? I believe that WG did not fix this CVE properly and want to check that.

@SakuraIsayeki
Copy link
Author

@SakuraIsayeki @imkindaprogrammermyself don't you have a code which creates and injects pickle with RCE into replays by any chance? I believe that WG did not fix this CVE properly and want to check that.

We do, as a matter of fact. Contact us on Discord, and we'll send you what we've got.
Here's my Discord: Sakura#9999

@imkindaprogrammermyself
Copy link
Contributor

Hmm... that's concerning.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants