Lucene search

K
LitellmLitellm

11 matches found

CVE
CVE
added 2024/09/13 4:15 p.m.121 views

CVE-2024-6587

A Server-Side Request Forgery (SSRF) vulnerability exists in berriai/litellm version 1.38.10. This vulnerability allows users to specify the api_base parameter when making requests to POST /chat/completions, causing the application to send the request to the domain specified by api_base. This reque...

7.5CVSS7.4AI score0.58887EPSS
CVE
CVE
added 2024/04/10 5:15 p.m.77 views

CVE-2024-2952

BerriAI/litellm is vulnerable to Server-Side Template Injection (SSTI) via the /completions endpoint. The vulnerability arises from the hf_chat_template method processing the chat_template parameter from the tokenizer_config.json file through the Jinja template engine without proper sanitization. A...

9.8CVSS9.8AI score0.01072EPSS
CVE
CVE
added 2024/06/06 7:16 p.m.75 views

CVE-2024-4890

A blind SQL injection vulnerability exists in the berriai/litellm application, specifically within the '/team/update' process. The vulnerability arises due to the improper handling of the 'user_id' parameter in the raw SQL query used for deleting users. An attacker can exploit this vulnerability by...

4.9CVSS5.4AI score0.00087EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.73 views

CVE-2024-9606

In berriai/litellm before version 1.44.12, the litellm/litellm_core_utils/litellm_logging.py file contains a vulnerability where the API key masking code only masks the first 5 characters of the key. This results in the leakage of almost the entire API key in the logs, exposing a significant amount...

7.5CVSS7.1AI score0.00058EPSS
CVE
CVE
added 2024/06/06 7:16 p.m.64 views

CVE-2024-5225

An SQL Injection vulnerability exists in the berriai/litellm repository, specifically within the /global/spend/logs endpoint. The vulnerability arises due to improper neutralization of special elements used in an SQL command. The affected code constructs an SQL query by concatenating an unvalidated...

7.2CVSS6.8AI score0.00133EPSS
CVE
CVE
added 2024/06/06 7:16 p.m.47 views

CVE-2024-4888

BerriAI's litellm, in its latest version, is vulnerable to arbitrary file deletion due to improper input validation on the /audio/transcriptions endpoint. An attacker can exploit this vulnerability by sending a specially crafted request that includes a file path to the server, which then deletes th...

8.1CVSS6.9AI score0.00057EPSS
CVE
CVE
added 2024/06/06 6:15 p.m.46 views

CVE-2024-4889

A code injection vulnerability exists in the berriai/litellm application, version 1.34.6, due to the use of unvalidated input in the eval function within the secret management system. This vulnerability requires a valid Google KMS configuration file to be exploitable. Specifically, by setting the U...

7.2CVSS7.2AI score0.00123EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.46 views

CVE-2024-8984

A Denial of Service (DoS) vulnerability exists in berriai/litellm version v1.44.5. This vulnerability can be exploited by appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request. The server continuously processes each character, leading to excessive resource ...

7.5CVSS7.4AI score0.00151EPSS
CVE
CVE
added 2024/06/27 7:15 p.m.38 views

CVE-2024-5751

BerriAI/litellm version v1.35.8 contains a vulnerability where an attacker can achieve remote code execution. The vulnerability exists in the add_deployment function, which decodes and decrypts environment variables from base64 and assigns them to os.environ. An attacker can exploit this by sending...

9.8CVSS9.7AI score0.00873EPSS
CVE
CVE
added 2024/06/27 7:15 p.m.37 views

CVE-2024-5710

berriai/litellm version 1.34.34 is vulnerable to improper access control in its team management functionality. This vulnerability allows attackers to perform unauthorized actions such as creating, updating, viewing, deleting, blocking, and unblocking any teams, as well as adding or deleting any mem...

6.5CVSS5.5AI score0.00091EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.35 views

CVE-2024-6825

BerriAI/litellm version 1.40.12 contains a vulnerability that allows remote code execution. The issue exists in the handling of the 'post_call_rules' configuration, where a callback function can be added. The provided value is split at the final '.' mark, with the last part considered the function ...

8.8CVSS9.1AI score0.00873EPSS