mudler/localai version 2.17.1 is vulnerable to a Timing Attack. This type of side-channel attack allows an attacker to compromise the cryptosystem by analyzing the time taken to execute cryptographic algorithms. Specifically, in the context of password handling, an attacker can determine valid login credentials based on the server's response time, potentially leading to unauthorized access.
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Link | Tags |
---|---|
https://huntr.com/bounties/e286ed00-6383-47de-b5bc-9b9fad67c362 | third party advisory exploit |
https://github.com/mudler/localai/commit/db1159b6511e8fa09e594f9db0fec6ab4e142468 | patch |