We found a Remote Code Execution (RCE) vulnerability in @Ollama - one of the most popular AI inference projects on GitHub. Here is everything you need to know about #Probllama (CVE-2024-37032) 🧵👇
The issue is a simple Path Traversal vulnerability which can be exploited by pulling a model from a private registry. By specifying a malicious digest field, it is possible to overwrite any file on the system!
We exploited the vulnerability by overwriting /etc/ld.so.preload to load our malicious shared library. This escalated our Arbitrary File Write into a Remote Code Execution 😎
Although a patch for this issue (0.1.34) has been available for over a month, most publicly exposed instances found on Censys are still vulnerable🤯
It's a bad idea to expose your Ollama instance anyway. Attackers can leak models, modify prompts, and use compute resources even without exploiting a vulnerability.
It literally takes one cURL command to inject a malicious prompt into existing Ollama models. It's a feature. Chocolate cakes should not contain dish soap.
This behavior is a common pattern we see in AI tooling: an immature codebase with simple vulnerabilities, no common security mechanism out-of-the-box. Infrastructure security is one of the most challenging aspects of AI security.
We uploaded a backdoored AI model to @HuggingFace which we could use to potentially access other customers’ data✨
Here is how we did it - and collaborated with Hugging Face to fix it 🧵⬇️
Hugging Face, one of the best-known AI-as-a-Service providers, conveniently lets users interact with the AI models hosted on their platform using their own inference infrastructure. This feature is called Inference API.
AI Models can come in different formats, based on the framework they were developed in. Some formats are safe, while others (like Pickle) allow Remote Code Execution as a feature!
We found two 0-day vulnerabilities in @Ubuntu kernel and it all started by reading descriptions of old CVEs 📖
Thread about the discovery of #GameOverlay 🧵👇🏼
Our journey started when our team at @wiz_io read the advisory about CVE-2023-0386, a local privilege escalation in the Linux kernel. The vulnerability exploited OverlayFS to copy SUID files from a nosuid mount to outside directories, enabling privilege escalation to root.
To mitigate the issue, an additional check was added to verify that the owner of the modified file is present in the current user namespace: