4.9 • 696 Ratings
🗓️ 14 April 2025
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Monday, April 14th, 2025 edition of the Sands Internet Storm Center's Stormcast. |
0:08.5 | My name is Johannes Ulrich, and today I'm recording from Orlando, Florida. |
0:14.1 | Well, I think on Friday I briefly mentioned a vulnerability in Langflow where we saw at the time a single exploit attempt. Since then, |
0:24.1 | the number of exploit attempts has skyrocketed. I think we have about a thousand now that we |
0:28.8 | have captured some of them with their payload. All of these requests come from Tor's endpoints, |
0:36.7 | as far as I've been able to tell. There may be a couple |
0:39.3 | that I missed, but that sort of indicates that it's a little bit different botnet. If it is a |
0:45.9 | botnet at all, that's not doing the scanning, more likely sort of a single source that just |
0:51.1 | obfuscates itself behind Tor. The payload that we have seen so far exclusively |
0:58.7 | and we don't capture payloads for all requests is a simple check for Etsy password, which |
1:05.5 | has the cat Etsy password. That's the command they are executing. Likely, it's just to check if a particular |
1:11.4 | system is vulnerable to this particular issue. Now, a little bit of background here. This |
1:18.3 | vulnerability in Langflow was originally discovered by Horizon 3. Horizon 3 late last week did |
1:25.6 | publish a blog post with details, including a proof of concept |
1:29.0 | exploit. The exploit, once you see it, is pretty straightforward. The vulnerability has been |
1:36.5 | patched about two weeks ago, like end of March, a bi-length flow. However, they never quite |
1:42.1 | acknowledged it as a vulnerability. The root cause is a particular |
1:46.6 | API endpoint that's essentially not authenticated and that then allows for this remote code |
1:53.8 | execution where you essentially inject arbitrary Python code that's executed by Langflow. |
2:01.3 | Now, Langflow itself is a tool that's been used by GenDic AI, meaning that it's used to |
2:06.9 | essentially orchestrate different AI tools and then also tools that execute on what |
2:12.4 | the AI outputs. |
... |
Transcript will be available on the free plan in 9 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.