From b60ef27f81e880996b0d2f37cfcbc8da2bf48c3c Mon Sep 17 00:00:00 2001 From: HGWAYEN <55834890+HGWAYEN@users.noreply.github.com> Date: Fri, 22 May 2026 19:36:24 +0800 Subject: [PATCH] Improve GHSA-m5gw-83w2-7749 --- .../GHSA-m5gw-83w2-7749.json | 23 ++++++++++++++++++- 1 file changed, 22 insertions(+), 1 deletion(-) diff --git a/advisories/unreviewed/2026/05/GHSA-m5gw-83w2-7749/GHSA-m5gw-83w2-7749.json b/advisories/unreviewed/2026/05/GHSA-m5gw-83w2-7749/GHSA-m5gw-83w2-7749.json index c608d3785a35d..70c30b48da0f6 100644 --- a/advisories/unreviewed/2026/05/GHSA-m5gw-83w2-7749/GHSA-m5gw-83w2-7749.json +++ b/advisories/unreviewed/2026/05/GHSA-m5gw-83w2-7749/GHSA-m5gw-83w2-7749.json @@ -6,6 +6,7 @@ "aliases": [ "CVE-2026-48207" ], + "summary": "PyFory ReduceSerializer DeserializationPolicy bypass", "details": "Deserialization of untrusted data in Apache Fory PyFory. PyFory's ReduceSerializer could bypass documented DeserializationPolicy validation hooks during reduce-state restoration and global-name resolution. An application is vulnerable if it deserializes attacker-controlled data using PyFory Python-native mode with strict mode disabled and relies on DeserializationPolicy to restrict unsafe classes, functions, or module attributes.\n\nThis issue affects Apache Fory: from before 1.0.0.\n\nMitigation: Users of Apache Fory are recommended to upgrade to version 1.0.0 or later, which enforces DeserializationPolicy validation for the affected ReduceSerializer paths and thus fixes this issue.", "severity": [ { @@ -13,7 +14,27 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "pyfory" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.13.0" + }, + { + "fixed": "1.0.0" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY",