<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>Simon Willison's Weblog: pickle</title><link href="http://simonwillison.net/" rel="alternate"/><link href="http://simonwillison.net/tags/pickle.atom" rel="self"/><id>http://simonwillison.net/</id><updated>2009-09-09T23:04:31+00:00</updated><author><name>Simon Willison</name></author><entry><title>Why Python Pickle is Insecure</title><link href="https://simonwillison.net/2009/Sep/9/pickle/#atom-tag" rel="alternate"/><published>2009-09-09T23:04:31+00:00</published><updated>2009-09-09T23:04:31+00:00</updated><id>https://simonwillison.net/2009/Sep/9/pickle/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://nadiana.com/python-pickle-insecure"&gt;Why Python Pickle is Insecure&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Because pickle is essentially a stack-based interpreter, so you can put os.system on the stack and use it to execute arbitrary commands.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/pickle"&gt;pickle&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/python"&gt;python&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;&lt;/p&gt;



</summary><category term="pickle"/><category term="python"/><category term="security"/></entry></feed>