Hackers Exploit Newly Disclosed Prison AI System Vulnerability

www.news4hackers.com-hackers-exploit-newly-disclosed-prison-ai-system-vulnerability-hackers-exploit-newly-disclosed-prison-ai-system-vulnerability

Authentication Bypass Vulnerability in PraisonAI

PraisonAI, a multifaceted framework for deploying autonomous AI agents, has been affected by a severe authentication bypass vulnerability. The issue arose due to the inclusion of a legacy Flask API server in versions 2.5.6 to 4.6.33, which had authentication disabled by default.

Exploitation Attempts

A scanner identified as “CVE-Detector/1.0” began probing the vulnerable endpoint on internet-exposed instances within three hours and 44 minutes of the advisory’s release. The activity was attributed to a scanner rather than interactive exploitation, with the scanner performing two consecutive sweeps, sending approximately 140 requests over roughly one minute.

Vulnerability Details

The vulnerability allowed unauthorized callers to access sensitive endpoints, including agents metadata and triggering workflows without providing a token. As explained by a National Institute of Standards and Technology (NIST) advisory, when the legacy server is utilized, any caller reaching it can execute the agents.yaml workflow through the “/chat” endpoint without authentication.

According to Sysdig, the observed activity was primarily aimed at reconnaissance and validation, with the scanner failing to send requests to the “/chat” endpoint.

Patch Release

The vulnerability was addressed in PraisonAI version 4.6.34, prompting organizations to update their deployments as soon as possible. Experts emphasize the critical importance of timely patching and mitigation in response to high-severity advisories affecting organizational stacks, especially considering the accelerated pace of exploitation following disclosure in the post-AI era.



About Author

en_USEnglish