CVE-2024-5225 – litellm
Package
Manager: pip
Name: litellm
Vulnerable Version: >=0 <1.40.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
EPSS: 0.00133 pctl0.33736
Details
SQL injection in litellm An SQL Injection vulnerability exists in the berriai/litellm repository, specifically within the `/global/spend/logs` endpoint. The vulnerability arises due to improper neutralization of special elements used in an SQL command. The affected code constructs an SQL query by concatenating an unvalidated `api_key` parameter directly into the query, making it susceptible to SQL Injection if the `api_key` contains malicious data. This issue affects the latest version of the repository. Successful exploitation of this vulnerability could lead to unauthorized access, data manipulation, exposure of confidential information, and denial of service (DoS).
Metadata
Created: 2024-06-06T21:30:37Z
Modified: 2024-06-06T22:54:22Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-h6m6-jj8v-94jj/GHSA-h6m6-jj8v-94jj.json
CWE IDs: ["CWE-89"]
Alternative ID: GHSA-h6m6-jj8v-94jj
Finding: F297
Auto approve: 1