Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Lightning AI Studio vulnerability allowed RCE via the hidden URL parameter
Global Security

Lightning AI Studio vulnerability allowed RCE via the hidden URL parameter

AdminBy AdminJanuary 30, 2025No Comments2 Mins Read
Lightning AI Studio Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 30, 2025Red LakshmananVulnerability / cloud security

Lightning AI Studio vulnerability

Cybersecurity researchers revealed a critical security lack of Lightning AI Studio The development platform that, if successfully used, can allow the removed code to execute.

Vulnerability that evaluates CVSS’s mark in 9.4 – Note In a report that shared with Hacker News.

“This level of access can be hypothetically used for a number of malicious activities, including the extraction of sensitive keys from the target accounts,” said Sasi Levi researchers, Alon Tron and Gal Moyal.

The problem is laid into a piece of JavaScript code, which can facilitate unobstructed access to the victim development environment, as well as execute arbitrary commands on the authentified goal in the privileged context.

Noma said he had found a hidden parameter called “team” in URL-specific users-back to pass the instructions, coded Base64, which will be executed on the main host.

Cybersecurity

Even worse, the breakthrough can be armed to launch commands that can highlight critical information, such as access tokens and user information on the controlled server attacker.

Successful vulnerability exploitation means that this can allow the enemy to perform arbitrary privileged commands and access the roots, data collection, and manipulate the file system to create, delete or change files on the server.

Lightning AI Studio vulnerability

All attackers have to remove this – this is the previous knowledge of the profile username and the associated AI Lightning Studio, the details that have Publicly available Through the gallery of the studio templates.

Armed with this information, the actor of the threat can later master the malicious connection so that he causes the code to perform in the identified studio according to the root permits. Following the responsible disclosure of information on October 14, 2024, the problem was solved by a lightning team from the II as of October 25.

“Vulnecs, such as these, emphasize the importance of displaying and providing tools and systems used to create, training and deployment of AI models from their sensitive nature,” the researchers said.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.