Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3xr8-qfvj-9p9j

Опубликовано: 06 июн. 2024
Источник: github
Github: Прошло ревью
CVSS4: 7
CVSS3: 6.5

Описание

Arbitrary file deletion in litellm

BerriAI's litellm, in its latest version, is vulnerable to arbitrary file deletion due to improper input validation on the /audio/transcriptions endpoint. An attacker can exploit this vulnerability by sending a specially crafted request that includes a file path to the server, which then deletes the specified file without proper authorization or validation. This vulnerability is present in the code where os.remove(file.filename) is used to delete a file, allowing any user to delete critical files on the server such as SSH keys, SQLite databases, or configuration files.

Пакеты

Наименование

litellm

pip
Затронутые версииВерсия исправления

< 1.35.36

1.35.36

EPSS

Процентиль: 19%
0.0006
Низкий

7 High

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-20
CWE-862

Связанные уязвимости

CVSS3: 8.1
nvd
больше 1 года назад

BerriAI's litellm, in its latest version, is vulnerable to arbitrary file deletion due to improper input validation on the `/audio/transcriptions` endpoint. An attacker can exploit this vulnerability by sending a specially crafted request that includes a file path to the server, which then deletes the specified file without proper authorization or validation. This vulnerability is present in the code where `os.remove(file.filename)` is used to delete a file, allowing any user to delete critical files on the server such as SSH keys, SQLite databases, or configuration files.

EPSS

Процентиль: 19%
0.0006
Низкий

7 High

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-20
CWE-862