You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The ultralytics versions 8.3.41, 8.3.42, 8.3.45, 8.3.46 are infected by malware.
This is for the people who may have installed this WebUI between this timeline (UTC):
ultralytics==8.3.41 ( was listed on PyPI for about 12 hours )
2024-12-04 20:51 ~2024-12-05 09:15
ultralytics==8.3.42 ( was listed on PyPI for about 1 hour )
2024-12-05 12:47 ~ 2024-12-05 13:47
There was an echo shell injection attack on ultralytics, 2024-12-05, about 48 hours ago.
Ultralytics is the object segmentation package that has more than 33k stars on Github, in this project it's used to detect the face part of the image.
The hacker successfully released the new versions of this package using echo shell injection - PR #18020, PR #18018.
The malicious versions are ultralytics==8.3.41 and ultralytics==8.3.42.
It gets the permission from your system for executable files, runs crypto mining job, and execute other malicious executable file.
Not only is it likely to be running crypto-mining code, it could be full-blown infostealer malware or whatever.
What you should do
Again, the infected packages are ultralytics==8.3.41 and ultralytics==8.3.42.
If you installed this WebUI between the timelines below (UTC) :
2024-12-04 20:51 ~2024-12-05 09:15
2024-12-05 12:47 ~ 2024-12-05 13:47
you're possibly infected by the malicious ultralytics version.
You should now check the installed ultralytics version with this WebUI
How to?
Open your terminal
Navigate to the project directory.
cd "/path/to/AdvancedLivePortrait-WebUI"
Activate the virtual environment:
On Windows:
.\venv\Scripts\activate
On macOS/Linux:
source venv/bin/activate
It will then display (venv) in front of the terminal. In this state, run pip show
(venv) pip show ultralytics
It will display the version of ultralytics. If the version is 8.3.41 or 8.3.42, it's recommended that you reinstall your operating system after backing up your important files to another server.
🚨 Security Alert from Ultralytics
The ultralytics versions 8.3.41, 8.3.42, 8.3.45, 8.3.46 are infected by malware.
This is for the people who may have installed this WebUI between this timeline (UTC):
ultralytics==8.3.41
( was listed on PyPI for about 12 hours )ultralytics==8.3.42
( was listed on PyPI for about 1 hour )There was an echo shell injection attack on ultralytics, 2024-12-05, about 48 hours ago.
Ultralytics is the object segmentation package that has more than 33k stars on Github, in this project it's used to detect the face part of the image.
The hacker successfully released the new versions of this package using echo shell injection - PR #18020, PR #18018.
The malicious versions are
ultralytics==8.3.41
andultralytics==8.3.42
.🚨 Severity
The severity is very high.
The injected code is:
It gets the permission from your system for executable files, runs crypto mining job, and execute other malicious executable file.
Not only is it likely to be running crypto-mining code, it could be full-blown infostealer malware or whatever.
What you should do
Again, the infected packages are
ultralytics==8.3.41
andultralytics==8.3.42
.If you installed this WebUI between the timelines below (UTC) :
2024-12-04 20:51 ~2024-12-05 09:15
2024-12-05 12:47 ~ 2024-12-05 13:47
you're possibly infected by the malicious ultralytics version.
You should now check the installed ultralytics version with this WebUI
How to?
(venv)
in front of the terminal. In this state, runpip show
It will display the version of
ultralytics
.If the version is 8.3.41 or 8.3.42, it's recommended that you reinstall your operating system after backing up your important files to another server.
Etc
The vulnerability was reported to Github Advisory prior to this attack - GHSA-7x29-qqmq-v6qc
And the issue is now tracked by ultralytics/ultralytics#18027
The text was updated successfully, but these errors were encountered: