litellm 1.82.8 中的恶意 litellm_init.pth — 凭证窃取者

📄 中文摘要

LiteLLM v1.82.8 包在 PyPI 上被恶意篡改,隐藏了一个特别恶劣的凭证窃取者,该窃取者以 base64 编码形式存在于 litellm_init.pth 文件中。这意味着只需安装该包即可触发该恶意代码,而无需运行 import litellm。虽然 1.82.7 版本也存在此漏洞,但恶意代码位于 proxy/proxy_server.py 文件中,需先导入该包才能生效。有关凭证窃取者的详细描述以及该漏洞的时间线信息,可以参考相关链接。

📄 English Summary

Malicious litellm_init.pth in litellm 1.82.8 — credential stealer

The LiteLLM v1.82.8 package published on PyPI was compromised with a particularly malicious credential stealer embedded in base64 within a litellm_init.pth file. This means that simply installing the package is sufficient to trigger the malicious code without the need to run import litellm. The exploit was also present in version 1.82.7, but it was located in the proxy/proxy_server.py file, requiring the package to be imported for activation. Detailed descriptions of the credential stealer's functionality and the timeline of the exploit can be found in the provided links.

Powered by Cloudflare Workers + Payload CMS + Claude 3.5

数据源: OpenAI, Google AI, DeepMind, AWS ML Blog, HuggingFace 等