CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
9.0%
A code injection vulnerability exists in the berriai/litellm application, version 1.34.6, due to the use of unvalidated input in the eval function within the secret management system. This vulnerability requires a valid Google KMS configuration file to be exploitable. Specifically, by setting the UI_LOGO_PATH
variable to a remote server address in the get_image
function, an attacker can write a malicious Google KMS configuration file to the cached_logo.jpg
file. This file can then be used to execute arbitrary code by assigning malicious code to the SAVE_CONFIG_TO_DB
environment variable, leading to full system control. The vulnerability is contingent upon the use of the Google KMS feature.
[
{
"vendor": "berriai",
"product": "berriai/litellm",
"versions": [
{
"version": "unspecified",
"status": "affected",
"versionType": "custom",
"lessThanOrEqual": "latest"
}
]
}
]