Protect AI Releases 'Bug Bounty' Report On This Month's Vulnerabilities
The vulnerabilities involve tools used to build AI apps
Protect AI, which offers artificial intelligence and machine language security, released its April vulnerability report Thursday.
The report was created with Protect AI's AL/ML "bug bounty" program, huntr. According to the company, the program is made up of over 15,000 members who hunt for vulnerabilities across the "entire OSS AL/ML supply chain."
The vulnerabilities involve tools used to build ML models that fuel AI applications. The huntr community, along with Protect AI researchers, found these tools to be vulnerable to "unique security threats."
Here is a list of the vulnerabilities huntr has discovered:
Remote Code Execution in PyTorch Serve
https://huntr.dev/bounties/f18ee3d1-8390-4de3-923a-5b453ba698a7
"Impact: Allows attackers to execute arbitrary code on the server hosting PyTorch Serve.
PyTorch Serve is vulnerable to an attack where a remote user could upload a model that contains malicious code if PyTorch Serve were exposed to the network. This code is executed when the model is deployed, leading to potential remote code execution on the server. Maintainers have updated the security documentation to help prevent users from being vulnerable."
Server-Side Template Injection in BerriAI/litellm
https://huntr.dev/bounties/a9e0a164-6de0-43a4-a640-0cbfb54220a4
"Impact: Enables attackers to execute unauthorized commands on the server.
The hf_chat_template method in BerriAI's litellm project processes user input through the Jinja template engine without proper sanitization. This can be exploited to execute arbitrary commands on the server."
Insecure Deserialization in BentoML
https://huntr.dev/bounties/349a1cce-6bb5-4345-82a5-bf7041b65a68
"Impact: Allows remote attackers to execute arbitrary code on the server.
BentoML is susceptible to an insecure deserialization vulnerability. By sending a specially crafted request, an attacker can execute arbitrary code on the server hosting the BentoML application."
Regular Expression Denial of Service (ReDoS) in FastAPI
https://huntr.dev/bounties/dd680268-d735-4f33-a358-d827694ab035
"Impact: Can cause the server to become unresponsive, leading to a denial of service.
FastAPI is vulnerable to a ReDoS attack under specific conditions when parsing Form data. This vulnerability can be exploited to make the server unresponsive by consuming all available CPU resources."
Protect AI also released recommendations to fix these vulnerabilities: