Python Supply-Chain Compromise
Overview
Researchers have discovered a malicious code injection in the Python Package Index (PyPI) through a compromised version of the litellm package, specifically version 1.82.8. This version includes a harmful .pth file that executes automatically when Python starts, without needing the litellm module to be imported. This means that any user who installs this package could unknowingly run the malicious code, posing a significant risk to their systems. The incident raises concerns about supply chain security in the Python ecosystem and underscores the need for better security measures, such as Software Bill of Materials (SBOMs) and verification systems. Users of Python and developers relying on this package should take immediate steps to secure their environments and avoid the compromised version.
Key Takeaways
- Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
- Affected Systems: Python Package Index (PyPI), litellm version 1.82.8
- Action Required: Users should uninstall litellm version 1.
- Timeline: Newly disclosed
Original Article Summary
This is news: A malicious supply chain compromise has been identified in the Python Package Index package litellm version 1.82.8. The published wheel contains a malicious .pth file (litellm_init.pth, 34,628 bytes) which is automatically executed by the Python interpreter on every startup, without requiring any explicit import of the litellm module. There are a lot of really boring things we need to do to help secure all of these critical libraries: SBOMs, SLSA, SigStore. But we have to do them.
Impact
Python Package Index (PyPI), litellm version 1.82.8
Exploitation Status
This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.
Timeline
Newly disclosed
Remediation
Users should uninstall litellm version 1.82.8 and replace it with a safe version. Additionally, implementing security measures like SBOMs and code signing is recommended.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to Malware, Critical.