CVE-2024-4264 – litellm
Package
Manager: pip
Name: litellm
Vulnerable Version: >=0 <=1.28.11
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.04638 pctl0.88869
Details
litellm passes untrusted data to `eval` function without sanitization A remote code execution (RCE) vulnerability exists in the berriai/litellm project due to improper control of the generation of code when using the `eval` function unsafely in the `litellm.get_secret()` method. Specifically, when the server utilizes Google KMS, untrusted data is passed to the `eval` function without any sanitization. Attackers can exploit this vulnerability by injecting malicious values into environment variables through the `/config/update` endpoint, which allows for the update of settings in `proxy_server_config.yaml`.
Metadata
Created: 2024-05-18T00:30:42Z
Modified: 2024-05-20T16:39:43Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-7ggm-4rjg-594w/GHSA-7ggm-4rjg-594w.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-7ggm-4rjg-594w
Finding: F422
Auto approve: 1