Lucene search

K
githubGitHub Advisory DatabaseGHSA-8J42-PCFM-3467
HistoryJun 06, 2024 - 9:30 p.m.

SQL injection in litellm

2024-06-0621:30:37
CWE-89
GitHub Advisory Database
github.com
5
sql injection
litellm
vulnerability
improper handling
user_id
api keys
unauthorized access
sensitive information
database
affected version
software

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

A blind SQL injection vulnerability exists in the berriai/litellm application, specifically within the ‘/team/update’ process. The vulnerability arises due to the improper handling of the ‘user_id’ parameter in the raw SQL query used for deleting users. An attacker can exploit this vulnerability by injecting malicious SQL commands through the ‘user_id’ parameter, leading to potential unauthorized access to sensitive information such as API keys, user information, and tokens stored in the database. The affected version is 1.27.14.

Affected configurations

Vulners
Node
litellmRange1.27.14
CPENameOperatorVersion
litellmle1.27.14

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for GHSA-8J42-PCFM-3467