Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-53gh-p8jc-7rg8

Опубликовано: 20 мар. 2025
Источник: github
Github: Прошло ревью
CVSS3: 8.8

Описание

LiteLLM Vulnerable to Remote Code Execution (RCE)

BerriAI/litellm version 1.40.12 contains a vulnerability that allows remote code execution. The issue exists in the handling of the 'post_call_rules' configuration, where a callback function can be added. The provided value is split at the final '.' mark, with the last part considered the function name and the remaining part appended with the '.py' extension and imported. This allows an attacker to set a system method, such as 'os.system', as a callback, enabling the execution of arbitrary commands when a chat response is processed.

Пакеты

Наименование

litellm

pip
Затронутые версииВерсия исправления

>= 1.40.3.dev2, <= 1.40.12

Отсутствует

EPSS

Процентиль: 80%
0.01349
Низкий

8.8 High

CVSS3

Дефекты

CWE-77
CWE-94

Связанные уязвимости

CVSS3: 8.8
nvd
11 месяцев назад

BerriAI/litellm version 1.40.12 contains a vulnerability that allows remote code execution. The issue exists in the handling of the 'post_call_rules' configuration, where a callback function can be added. The provided value is split at the final '.' mark, with the last part considered the function name and the remaining part appended with the '.py' extension and imported. This allows an attacker to set a system method, such as 'os.system', as a callback, enabling the execution of arbitrary commands when a chat response is processed.

EPSS

Процентиль: 80%
0.01349
Низкий

8.8 High

CVSS3

Дефекты

CWE-77
CWE-94