CVE-2024-5751

BerriAI/litellm version v1.35.8 contains a vulnerability where an attacker can achieve remote code execution. The vulnerability exists in the `add_deployment` function, which decodes and decrypts environment variables from base64 and assigns them to `os.environ`. An attacker can exploit this by sending a malicious payload to the `/config/update` endpoint, which is then processed and executed by the server when the `get_secret` function is triggered. This requires the server to use Google KMS and a database to store a model.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:litellm:litellm:1.35.8:*:*:*:*:*:*:*

History

20 Sep 2024, 18:01

Type Values Removed Values Added
References () https://huntr.com/bounties/ae623c2f-b64b-4245-9ed4-f13a0a5824ce - () https://huntr.com/bounties/ae623c2f-b64b-4245-9ed4-f13a0a5824ce - Third Party Advisory
CPE cpe:2.3:a:litellm:litellm:1.35.8:*:*:*:*:*:*:*
First Time Litellm litellm
Litellm
Summary
  • (es) BerriAI/litellm versión v1.35.8 contiene una vulnerabilidad donde un atacante puede lograr la ejecución remota de código. La vulnerabilidad existe en la función `add_deployment`, que decodifica y descifra variables de entorno de base64 y las asigna a `os.environ`. Un atacante puede aprovechar esto enviando una carga maliciosa al endpoint `/config/update`, que luego es procesada y ejecutada por el servidor cuando se activa la función `get_secret`. Esto requiere que el servidor utilice Google KMS y una base de datos para almacenar un modelo.

27 Jun 2024, 19:25

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-27 19:15

Updated : 2024-09-20 18:01


NVD link : CVE-2024-5751

Mitre link : CVE-2024-5751

CVE.ORG link : CVE-2024-5751


JSON object : View

Products Affected

litellm

  • litellm
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')