High

localai

Timing Attack Vulnerability in API Key Handling

A timing attack vulnerability was discovered in version 2.17.1 of the software, allowing attackers to guess API keys based on response times. The issue has not yet been patched.

Available publicly on Sep 30 2024

7.5

CVSS:

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Credit:

mvlttt
Threat Overview

The vulnerability allows an attacker to exploit the time taken by the server to validate API keys. By measuring the response times for different guesses, the attacker can incrementally determine the correct API key. This type of side-channel attack can lead to unauthorized access to the system.

Attack Scenario

An attacker could set up a script to send multiple requests to the server, each with a slightly different API key guess. By analyzing the response times, the attacker can determine which characters are correct and eventually reconstruct the entire API key, gaining unauthorized access.

Who is affected

Users running version 2.17.1 of the software who rely on API key authentication are affected by this vulnerability.

Technical Report
Want more out of Sightline?

Sightline offers even more for premium customers

Go Premium

We have - related security advisories that are available with Sightline Premium.