Researchers from Noma Security have discovered a high-severity Remote Code Execution vulnerability in Lightning AI Studio, escalating risks for users and prompting a vital security update.

In a notable development in the realm of artificial intelligence, researchers from Noma Security have identified a high-severity Remote Code Execution (RCE) vulnerability within Lightning AI Studio, a popular platform used for AI development. The vulnerability, which has garnered a CVSS score of 9.4, poses substantial risks to users, enabling attackers to execute arbitrary commands with root privileges. This, in turn, raises concerns around potential data exfiltration and system compromise.

The critical vulnerability was associated with a concealed URL parameter named “command” embedded in the terminal functionality of Lightning AI Studio. Although this parameter was hidden from users, malicious actors could exploit it by crafting a Base64-encoded payload. By appending this payload to user-specific URLs, attackers were able to execute harmful commands due to the platform’s lack of input sanitization. For example, through this exploit, an attacker could issue a command to recursively delete files or access sensitive AWS metadata, such as access tokens, redirecting that data to a remote server.

The exploit required publicly available information, including usernames and studio paths, which could be extracted from Lightning AI’s shared studio templates. As a result, victims could be targeted by means of malicious links, distributed through emails or public forums, which would trigger the exploit upon a user’s click.

Lightning AI Studio, operating as a cloud-based platform for AI development, supports a variety of workflows, including training and deployment. Its popularity among enterprises and developers is attributed to features such as a Visual Studio Code-like interface and persistent environments. However, the vulnerability discovered within its handling of user-controllable inputs, specifically hidden URL parameters, has brought into question the platform’s overall security.

The URL schema for Lightning AI Studio includes variables such as PROFILE_USERNAME and STUDIO_PATH, which are used to uniquely identify user studios. Attackers managed to exploit these variables, creating malicious URLs that could redirect authenticated users to terminals equipped with detrimental commands.

The ramifications of this exploit were significant. Attackers had the potential to execute arbitrary commands, exfiltrate sensitive data, and compromise filesystems, including the deletion or alteration of key system files, thereby disrupting operational integrity. Given that Lightning AI Studio is integral to enterprise-grade AI workflows, the exploitation risk extended to sensitive AI models and data pipelines across environments shared by multiple users.

Following a responsible disclosure on October 14, 2024, Noma Security worked closely with Lightning AI to resolve the vulnerability, leading to the rollout of a fix by October 25, 2024. Key insights gleaned from this incident underscore the necessity for rigorous input validation, adherence to the principle of least privilege, and a prohibition against the execution of user-controlled inputs to avoid command injection vulnerabilities.

This incident serves as a significant reminder of the importance of embedding robust security measures into the AI development lifecycle. As innovation within the industry accelerates, the resilience of platforms like Lightning AI is crucial. Noma Security’s role in pinpointing and addressing such vulnerabilities illustrates their commitment to safeguarding the AI ecosystem from emerging threats.

Source: Noah Wire Services

More on this

Noah Fact Check Pro

The draft above was created using the information available at the time the story first
emerged. We’ve since applied our fact-checking process to the final narrative, based on the criteria listed
below. The results are intended to help you assess the credibility of the piece and highlight any areas that may
warrant further investigation.

Freshness check

Score:
9

Notes:
The narrative references a recent vulnerability disclosure and fix in October 2024, indicating the information is current and not recycled from older sources.

Quotes check

Score:
10

Notes:
There are no direct quotes in the narrative, so there is no risk of quote duplication or misattribution.

Source reliability

Score:
7

Notes:
The narrative originates from GB Hackers, which is not as widely recognized as major news outlets like BBC or Reuters. However, it appears to provide specific technical details and references recent events.

Plausability check

Score:
9

Notes:
The claims about a high-severity vulnerability in Lightning AI Studio are plausible given the context of AI security risks and the specific technical details provided.

Overall assessment

Verdict (FAIL, OPEN, PASS): PASS

Confidence (LOW, MEDIUM, HIGH): HIGH

Summary:
The narrative appears to be fresh and based on recent events, lacks direct quotes, and while the source is not a major news outlet, the technical details provided support the plausibility of the claims.

Share.
Leave A Reply

Exit mobile version