CVE-2024-2952

BerriAI/litellm is vulnerable to Server-Side Template Injection (SSTI) via the `/completions` endpoint. The vulnerability arises from the `hf_chat_template` method processing the `chat_template` parameter from the `tokenizer_config.json` file through the Jinja template engine without proper sanitization. Attackers can exploit this by crafting malicious `tokenizer_config.json` files that execute arbitrary code on the server.
Configurations

No configuration.

History

21 Nov 2024, 09:10

Type Values Removed Values Added
References () https://github.com/berriai/litellm/commit/8a1cdc901708b07b7ff4eca20f9cb0f1f0e8d0b3 - () https://github.com/berriai/litellm/commit/8a1cdc901708b07b7ff4eca20f9cb0f1f0e8d0b3 -
References () https://huntr.com/bounties/a9e0a164-6de0-43a4-a640-0cbfb54220a4 - () https://huntr.com/bounties/a9e0a164-6de0-43a4-a640-0cbfb54220a4 -
Summary
  • (es) BerriAI/litellm es vulnerable a Server-Side Template Injection (SSTI) a través del endpoint `/completions`. La vulnerabilidad surge del método `hf_chat_template` que procesa el parámetro `chat_template` del archivo `tokenizer_config.json` a través del motor de plantillas Jinja sin una sanitización adecuada. Los atacantes pueden aprovechar esto creando archivos maliciosos `tokenizer_config.json` que ejecutan código arbitrario en el servidor.

15 Apr 2024, 18:15

Type Values Removed Values Added
References
  • () https://github.com/berriai/litellm/commit/8a1cdc901708b07b7ff4eca20f9cb0f1f0e8d0b3 -

10 Apr 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-10 17:15

Updated : 2024-11-21 09:10


NVD link : CVE-2024-2952

Mitre link : CVE-2024-2952

CVE.ORG link : CVE-2024-2952


JSON object : View

Products Affected

No product.

CWE
CWE-76

Improper Neutralization of Equivalent Special Elements