Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs
好的,用户让我总结这篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我需要快速浏览文章内容,抓住主要信息。 文章主要讲的是Chainlit这个开源AI框架发现的安全漏洞,叫做ChainLeak。漏洞允许攻击者窃取敏感数据,比如API密钥和文件,甚至进行SSRF攻击。文章还提到了两个具体的CVE编号和评分,以及修复版本的信息。 另外,文章还提到微软的MarkItDown MCP服务器存在漏洞,称为MCP fURI,同样涉及SSRF和数据泄露的风险。修复建议包括使用IMDSv2、限制访问等。 接下来,我需要将这些信息浓缩到100字以内。重点包括Chainlit的漏洞、影响、CVE细节以及微软的问题和修复建议。 确保语言简洁明了,避免使用复杂的术语。同时,注意不要遗漏关键点:Chainlit的漏洞、攻击可能性、修复措施以及微软的问题。 最后检查字数是否符合要求,并确保信息准确无误。 </think> Chainlit开源AI框架被发现存在高危漏洞(ChainLeak),可导致敏感数据泄露、SSRF攻击及横向移动。研究人员披露了两个漏洞(CVE-2026-22218和CVE-2026-22219),分别涉及任意文件读取和SSRF攻击。修复版本已发布。此外,微软MarkItDown MCP服务器被曝存在MCP fURI漏洞,可引发SSRF和数据泄露风险。 2026-1-21 09:10:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Vulnerability / Artificial Intelligence

Security vulnerabilities were uncovered in the popular open-source artificial intelligence (AI) framework Chainlit that could allow attackers to steal sensitive data, which may allow for lateral movement within a susceptible organization.

Zafran Security said the high-severity flaws, collectively dubbed ChainLeak, could be abused to leak cloud environment API keys and steal sensitive files, or perform server-side request forgery (SSRF) attacks against servers hosting AI applications.

Chainlit is a framework for creating conversational chatbots. According to statistics shared by the Python Software Foundation, the package has been downloaded over 220,000 times over the past week. It has attracted a total of 7.3 million downloads to date.

Cybersecurity

Details of the two vulnerabilities are as follows -

  • CVE-2026-22218 (CVSS score: 7.1) - An arbitrary file read vulnerability in the "/project/element" update flow that allows an authenticated attacker to access the contents of any file readable by the service into their own session due to a lack of validation of user-controller fields
  • CVE-2026-22219 (CVSS score: 8.3) - An SSRF vulnerability in the "/project/element" update flow when configured with the SQLAlchemy data layer backend that allows an attacker to make arbitrary HTTP requests to internal network services or cloud metadata endpoints from the Chainlit server and store the retrieved responses

"The two Chainlit vulnerabilities can be combined in multiple ways to leak sensitive data, escalate privileges, and move laterally within the system," Zafran researchers Gal Zaban and Ido Shani said. "Once an attacker gains arbitrary file read access on the server, the AI application's security quickly begins to collapse. What initially appears to be a contained flaw becomes direct access to the system's most sensitive secrets and internal state."

For instance, an attacker can weaponize CVE-2026-22218 to read "/proc/self/environ," allowing them to glean valuable information such as API keys, credentials, and internal file paths that could be used to burrow deeper into the compromised network and even gain access to the application source code. Alternatively, it can be used to leak database files if the setup uses SQLAlchemy with an SQLite backend as its data layer.

Following responsible disclosure on November 23, 2025, both vulnerabilities were addressed by Chainlit in version 2.9.4 released on December 24, 2025.

"As organizations rapidly adopt AI frameworks and third-party components, long-standing classes of software vulnerabilities are being embedded directly into AI infrastructure," Zafran said. "These frameworks introduce new and often poorly understood attack surfaces, where well-known vulnerability classes can directly compromise AI-powered systems."

Flaw in Microsoft MarkItDown MCP Server

The disclosure comes as BlueRock disclosed a vulnerability in Microsoft's MarkItDown Model Context Protocol (MCP) server dubbed MCP fURI that enables arbitrary calling of URI resources, exposing organizations to privilege escalation, SSRF, and data leakage attacks. The shortcoming affects the server when running in an Amazon Web Services (AWS) EC2 instance using IDMSv1.

Cybersecurity

"This vulnerability allows an attacker to execute the Markitdown MCP tool convert_to_markdown to call an arbitrary uniform resource identifier (URI)," BlueRock said. "The lack of any boundaries on the URI allows any user, agent, or attacker calling the tool to access any HTTP or file resource."

"When providing a URI to the Markitdown MCP server, this can be used to query the instance metadata of the server. A user can then obtain credentials to the instance if there is a role associated, giving you access to the AWS account, including the access and secret keys."

The agentic AI security company said its analysis of more than 7,000 MCP servers found that over 36.7% of them are likely exposed to similar SSRF vulnerabilities. To mitigate the risk posed by the issue, it's advised to use IMDSv2 to secure against SSRF attacks, implement private IP blocking, restrict access to metadata services, and create an allowlist to prevent data exfiltration.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/chainlit-ai-framework-flaws-enable-data.html
如有侵权请联系:admin#unsafe.sh