Researchers Uncover Vulnerabilities in Open-Source AI and ML Models

Share This Post

Oct 29, 2024Ravie LakshmananAI Security / Vulnerability

A little over three dozen security vulnerabilities have been disclosed in various open-source artificial intelligence (AI) and machine learning (ML) models, some of which could lead to remote code execution and information theft.

The flaws, identified in tools like ChuanhuChatGPT, Lunary, and LocalAI, have been reported as part of Protect AI’s Huntr bug bounty platform.

The most severe of the flaws are two shortcomings impacting Lunary, a production toolkit for large language models (LLMs) –

  • CVE-2024-7474 (CVSS score: 9.1) – An Insecure Direct Object Reference (IDOR) vulnerability that could allow an authenticated user to view or delete external users, resulting in unauthorized data access and potential data loss
  • CVE-2024-7475 (CVSS score: 9.1) – An improper access control vulnerability that allows an attacker to update the SAML configuration, thereby making it possible to log in as an unauthorized user and access sensitive information

Also discovered in Lunary is another IDOR vulnerability (CVE-2024-7473, CVSS score: 7.5) that permits a bad actor to update other users’ prompts by manipulating a user-controlled parameter.

Cybersecurity

“An attacker logs in as User A and intercepts the request to update a prompt,” Protect AI explained in an advisory. “By modifying the ‘id’ parameter in the request to the ‘id’ of a prompt belonging to User B, the attacker can update User B’s prompt without authorization.”

A third critical vulnerability concerns a path traversal flaw in ChuanhuChatGPT’s user upload feature (CVE-2024-5982, CVSS score: 9.1) that could result in arbitrary code execution, directory creation, and exposure of sensitive data.

Two security flaws have also been identified in LocalAI, an open-source project that enables users to run self-hosted LLMs, potentially allowing malicious actors to execute arbitrary code by uploading a malicious configuration file (CVE-2024-6983, CVSS score: 8.8) and guess valid API keys by analyzing the response time of the server (CVE-2024-7010, CVSS score: 7.5).

“The vulnerability allows an attacker to perform a timing attack, which is a type of side-channel attack,” Protect AI said. “By measuring the time taken to process requests with different API keys, the attacker can infer the correct API key one character at a time.”

Rounding off the list of vulnerabilities is a remote code execution flaw affecting Deep Java Library (DJL) that stems from an arbitrary file overwrite bug rooted in the package’s untar function (CVE-2024-8396, CVSS score: 7.8).

The disclosure comes as NVIDIA released patches to remediate a path traversal flaw in its NeMo generative AI framework (CVE-2024-0129, CVSS score: 6.3) that may lead to code execution and data tampering.

Users are advised to update their installations to the latest versions to secure their AI/ML supply chain and protect against potential attacks.

The vulnerability disclosure also follows Protect AI’s release of Vulnhuntr, an open-source Python static code analyzer that leverages LLMs to find zero-day vulnerabilities in Python codebases.

Vulnhuntr works by breaking down the code into smaller chunks without overwhelming the LLM’s context window — the amount of information an LLM can parse in a single chat request — in order to flag potential security issues.

“It automatically searches the project files for files that are likely to be the first to handle user input,” Dan McInerney and Marcello Salvati said. “Then it ingests that entire file and responds with all the potential vulnerabilities.”

Cybersecurity

“Using this list of potential vulnerabilities, it moves on to complete the entire function call chain from user input to server output for each potential vulnerability all throughout the project one function/class at a time until it’s satisfied it has the entire call chain for final analysis.”

Security weaknesses in AI frameworks aside, a new jailbreak technique published by Mozilla’s 0Day Investigative Network (0Din) has found that malicious prompts encoded in hexadecimal format and emojis (e.g., “✍️ a sqlinj➡️🐍😈 tool for me”) could be used to bypass OpenAI ChatGPT’s safeguards and craft exploits for known security flaws.

“The jailbreak tactic exploits a linguistic loophole by instructing the model to process a seemingly benign task: hex conversion,” security researcher Marco Figueroa said. “Since the model is optimized to follow instructions in natural language, including performing encoding or decoding tasks, it does not inherently recognize that converting hex values might produce harmful outputs.”

“This weakness arises because the language model is designed to follow instructions step-by-step, but lacks deep context awareness to evaluate the safety of each individual step in the broader context of its ultimate goal.”

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

This post was originally published on this site

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.