BerriAI/litellm is vulnerable to Server-Side Template Injection (SSTI) via the `/completions` endpoint. The vulnerability arises from the `hf_chat_template` method processing the `chat_template` parameter from the `tokenizer_config.json` file through the Jinja template engine without proper sanitization. Attackers can exploit this by crafting malicious `tokenizer_config.json` files that execute arbitrary code on the server.
References
Configurations
No configuration.
History
21 Nov 2024, 09:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/berriai/litellm/commit/8a1cdc901708b07b7ff4eca20f9cb0f1f0e8d0b3 - | |
References | () https://huntr.com/bounties/a9e0a164-6de0-43a4-a640-0cbfb54220a4 - | |
Summary |
|
15 Apr 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Apr 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-10 17:15
Updated : 2024-11-21 09:10
NVD link : CVE-2024-2952
Mitre link : CVE-2024-2952
CVE.ORG link : CVE-2024-2952
JSON object : View
Products Affected
No product.
CWE
CWE-76
Improper Neutralization of Equivalent Special Elements