9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.9 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
9.1%
BerriAI/litellm is vulnerable to Server-Side Template Injection (SSTI) via the /completions
endpoint. The vulnerability arises from the hf_chat_template
method processing the chat_template
parameter from the tokenizer_config.json
file through the Jinja template engine without proper sanitization. Attackers can exploit this by crafting malicious tokenizer_config.json
files that execute arbitrary code on the server.
github.com/advisories/GHSA-46cm-pfwv-cgf8
github.com/BerriAI/litellm/blob/0d803e13798db40aa7463e64a6bafaee386424f5/litellm/proxy/proxy_server.py#L2087
github.com/BerriAI/litellm/commit/8a1cdc901708b07b7ff4eca20f9cb0f1f0e8d0b3
github.com/BerriAI/litellm/issues/2949
github.com/BerriAI/litellm/pull/2941
huntr.com/bounties/a9e0a164-6de0-43a4-a640-0cbfb54220a4
nvd.nist.gov/vuln/detail/CVE-2024-2952
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.9 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
9.1%