<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[LiteLLM 高危 SQL 注入漏洞披露 36 小时即遭定向利用，攻击者直奔三张高价值密钥表]]></title><description><![CDATA[<p dir="auto">LiteLLM 是 GitHub 22,000+ star 的开源 LLM 网关，被广泛用作 OpenAI、Anthropic、Bedrock 等模型提供商的统一前端。漏洞 CVE-2026-42208（GHSA-r75f-5x8p-qvmc）是一个预身份验证 SQL 注入：受影响版本（≥ 1.81.16，&lt; 1.83.7）将 <code>Authorization: Bearer</code> 头部值未经参数化绑定即拼接进对 <code>LiteLLM_VerificationToken</code> 表的 SELECT 查询，任何能触达 LiteLLM 代理 4000 端口的攻击者都能在无凭据情况下对其 PostgreSQL 后端执行任意 SELECT 语句。漏洞先于 4 月 20 日 21:14 UTC 在 LiteLLM 仓库安全标签下发布，4 月 24 日 16:17 UTC 被全局 GitHub Advisory Database 收录；修复版本 v1.83.7 已用参数化查询替换原拼接逻辑。</p>
<p dir="auto">Sysdig 威胁研究团队（TRT）观察到首次利用尝试出现在通告进入全局数据库后 36 小时 7 分钟。攻击轨迹显示攻击者并非常见的 SQLmap 通用扫描，而是经过精心定制的定向枚举：源 IP 65.111.27.132（德国 AS200373，3xK Tech GmbH）于 4 月 26 日 04:24 UTC 起以 17 个 UNION 载荷连续打击三张最高价值的表——<code>LiteLLM_VerificationToken</code>（虚拟 API 密钥与主密钥）、<code>litellm_credentials</code>（上游 OpenAI/Anthropic/Bedrock 凭据）、<code>litellm_config</code>（含 Postgres DSN、主密钥、回调 webhook 与缓存配置的环境变量），完全跳过 <code>litellm_users</code> 等无关表。攻击者明显事先阅读了 LiteLLM 的 Prisma schema：先用小写表名失败后立即切换至 PascalCase 引号形式，并以 1/2/3/5/6 列的标准列数枚举法快速锁定查询结构。21 分钟后同 /22 子网内第二个 IP 65.111.25.67 在 25 秒内重发一遍精炼载荷集，并以 <code>OR 1=1--</code> 与对 <code>/key/generate</code>、<code>/key/info</code> 的未授权探测收尾——典型的自动化 harness 耗尽 payload 后的退化行为。Sysdig 未观察到后续认证调用，但提示所有曾在窗口期暴露公网的 LiteLLM 实例应视同已被入侵：立即升级至 v1.83.7、轮换全部虚拟密钥与上游提供商凭据、审计 <code>/chat/completions</code> 异常 IP 的费用账单。事件再次说明 AI 网关已成为云级凭据的聚合面，单次 SQL 注入的爆炸半径接近"云账号沦陷"。</p>
<p dir="auto"><a href="https://www.cve.org/CVERecord?id=CVE-2026-42208" target="_blank" rel="noopener noreferrer nofollow ugc">CVE Record</a> | <a href="https://webflow.sysdig.com/blog/cve-2026-42208-targeted-sql-injection-against-litellms-authentication-path-discovered-36-hours-following-vulnerability-disclosure" target="_blank" rel="noopener noreferrer nofollow ugc">Sysdig</a> | <a href="https://github.com/advisories/GHSA-r75f-5x8p-qvmc" target="_blank" rel="noopener noreferrer nofollow ugc">GitHub Advisory</a> | <a href="https://github.com/BerriAI/litellm/releases/tag/v1.83.7-stable" target="_blank" rel="noopener noreferrer nofollow ugc">LiteLLM v1.83.7</a></p>
<p dir="auto"></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://webflow.sysdig.com/blog/cve-2026-42208-targeted-sql-injection-against-litellms-authentication-path-discovered-36-hours-following-vulnerability-disclosure" title="CVE-2026-42208: Targeted SQL injection against LiteLLM's authentication path discovered 36 hours following vulnerability disclosure | Sysdig">
<img src="https://cdn.prod.website-files.com/681e366f54a6e3ce87159ca4/69efaeb1f47952c5e358ec39_Fast-track%20CVE%20announcement%204%20(2).png" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a class="text-decoration-none" href="https://webflow.sysdig.com/blog/cve-2026-42208-targeted-sql-injection-against-litellms-authentication-path-discovered-36-hours-following-vulnerability-disclosure">
CVE-2026-42208: Targeted SQL injection against LiteLLM's authentication path discovered 36 hours following vulnerability disclosure | Sysdig
</a>
</h5>
<p class="card-text line-clamp-3">Critical vulnerability CVE-2026-42208 exposes LiteLLM to pre-auth SQL injection, enabling attackers to extract API keys and credentials. Sysdig analysis reveals targeted exploitation within 36 hours of disclosure.</p>
</div>
<a href="https://webflow.sysdig.com/blog/cve-2026-42208-targeted-sql-injection-against-litellms-authentication-path-discovered-36-hours-following-vulnerability-disclosure" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://cdn.prod.website-files.com/681a1c8e5b6ebfc0f8529533/6969fec85fdeeafbc8914064_favicon.png" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />







<p class="d-inline-block text-truncate mb-0"> <span class="text-secondary">(webflow.sysdig.com)</span></p>
</a>
</div><p></p>
<p dir="auto"></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://github.com/advisories/GHSA-r75f-5x8p-qvmc" title="GHSA-r75f-5x8p-qvmc - GitHub Advisory Database">
<img src="https://github.githubassets.com/assets/advisory-database-show-f32c8207dfb2.png" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a class="text-decoration-none" href="https://github.com/advisories/GHSA-r75f-5x8p-qvmc">
GHSA-r75f-5x8p-qvmc - GitHub Advisory Database
</a>
</h5>
<p class="card-text line-clamp-3">GitHub is where people build software. More than 150 million people use GitHub to discover, fork, and contribute to over 420 million projects.</p>
</div>
<a href="https://github.com/advisories/GHSA-r75f-5x8p-qvmc" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://github.githubassets.com/favicons/favicon.svg" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />



<p class="d-inline-block text-truncate mb-0">GitHub <span class="text-secondary">(github.com)</span></p>
</a>
</div><p></p>
<p dir="auto"></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://github.com/BerriAI/litellm/releases/tag/v1.83.7-stable" title="Release v1.83.7-stable · BerriAI/litellm">
<img src="https://opengraph.githubassets.com/27b82ce58f3bc76ef8157039a832f95752910b58bf9adf0ab0c5fd8ad86e5203/BerriAI/litellm/releases/tag/v1.83.7-stable" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a class="text-decoration-none" href="https://github.com/BerriAI/litellm/releases/tag/v1.83.7-stable">
Release v1.83.7-stable · BerriAI/litellm
</a>
</h5>
<p class="card-text line-clamp-3">Python SDK, Proxy Server (AI Gateway) to call 100+ LLM APIs in OpenAI (or native) format, with cost tracking, guardrails, loadbalancing and logging. [Bedrock, Azure, OpenAI, VertexAI, Cohere, Anthropic, Sagemaker, HuggingFace, VLLM, NVIDIA NIM] - Release v1.83.7-stable · BerriAI/litellm</p>
</div>
<a href="https://github.com/BerriAI/litellm/releases/tag/v1.83.7-stable" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://github.githubassets.com/favicons/favicon.svg" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />



<p class="d-inline-block text-truncate mb-0">GitHub <span class="text-secondary">(github.com)</span></p>
</a>
</div><p></p>
]]></description><link>https://welinux.com//topic/89/litellm-高危-sql-注入漏洞披露-36-小时即遭定向利用-攻击者直奔三张高价值密钥表</link><generator>RSS for Node</generator><lastBuildDate>Sat, 02 May 2026 21:06:38 GMT</lastBuildDate><atom:link href="https://welinux.com//topic/89.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 28 Apr 2026 15:47:25 GMT</pubDate><ttl>60</ttl></channel></rss>