Remote Code Execution in berriai/litellm due to improper control of `eval` function in `litellm.get_secret()
Reporter | Title | Published | Views | Family All 6 |
---|---|---|---|---|
![]() | Code Injection | 23 May 202407:39 | – | veracode |
![]() | CVE-2024-4264 | 18 May 202400:15 | – | cve |
![]() | litellm passes untrusted data to `eval` function without sanitization | 18 May 202400:30 | – | github |
![]() | CVE-2024-4264 Remote Code Execution in berriai/litellm | 18 May 202400:00 | – | vulnrichment |
![]() | litellm passes untrusted data to `eval` function without sanitization | 18 May 202400:30 | – | osv |
![]() | CVE-2024-4264 | 18 May 202400:15 | – | nvd |
[
{
"vendor": "berriai",
"product": "berriai/litellm",
"versions": [
{
"version": "unspecified",
"status": "affected",
"versionType": "custom",
"lessThanOrEqual": "latest"
}
]
}
]
Source | Link |
---|---|
huntr | www.huntr.com/bounties/a3221b0c-6e25-4295-ab0f-042997e8fc61 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo