Lucene search

K
githubGitHub Advisory DatabaseGHSA-GPPG-GQW8-WH9G
HistoryJun 27, 2024 - 9:32 p.m.

litellm vulnerable to remote code execution based on using eval unsafely

2024-06-2721:32:08
CWE-94
GitHub Advisory Database
github.com
1
berriai/litellm
v1.35.8
vulnerability
remote code execution
unsafe eval
add_deployment function
base64
os.environ
malicious payload
config/update endpoint
get_secret function
google kms
database

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

BerriAI/litellm version v1.35.8 contains a vulnerability where an attacker can achieve remote code execution. The vulnerability exists in the add_deployment function, which decodes and decrypts environment variables from base64 and assigns them to os.environ. An attacker can exploit this by sending a malicious payload to the /config/update endpoint, which is then processed and executed by the server when the get_secret function is triggered. This requires the server to use Google KMS and a database to store a model.

Affected configurations

Vulners
Node
litellmRange<1.40.16
CPENameOperatorVersion
litellmlt1.40.16

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Related for GHSA-GPPG-GQW8-WH9G