logo

CVE-2024-5225 litellm

Package

Manager: pip
Name: litellm
Vulnerable Version: >=0 <1.40.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N

EPSS: 0.00133 pctl0.33736

Details

SQL injection in litellm An SQL Injection vulnerability exists in the berriai/litellm repository, specifically within the `/global/spend/logs` endpoint. The vulnerability arises due to improper neutralization of special elements used in an SQL command. The affected code constructs an SQL query by concatenating an unvalidated `api_key` parameter directly into the query, making it susceptible to SQL Injection if the `api_key` contains malicious data. This issue affects the latest version of the repository. Successful exploitation of this vulnerability could lead to unauthorized access, data manipulation, exposure of confidential information, and denial of service (DoS).

Metadata

Created: 2024-06-06T21:30:37Z
Modified: 2024-06-06T22:54:22Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-h6m6-jj8v-94jj/GHSA-h6m6-jj8v-94jj.json
CWE IDs: ["CWE-89"]
Alternative ID: GHSA-h6m6-jj8v-94jj
Finding: F297
Auto approve: 1