Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gppg-gqw8-wh9g

Опубликовано: 27 июн. 2024
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

litellm vulnerable to remote code execution based on using eval unsafely

BerriAI/litellm version v1.35.8 contains a vulnerability where an attacker can achieve remote code execution. The vulnerability exists in the add_deployment function, which decodes and decrypts environment variables from base64 and assigns them to os.environ. An attacker can exploit this by sending a malicious payload to the /config/update endpoint, which is then processed and executed by the server when the get_secret function is triggered. This requires the server to use Google KMS and a database to store a model.

Пакеты

Наименование

litellm

pip
Затронутые версииВерсия исправления

< 1.40.16

1.40.16

EPSS

Процентиль: 90%
0.05359
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-94

Связанные уязвимости

CVSS3: 9.8
nvd
больше 1 года назад

BerriAI/litellm version v1.35.8 contains a vulnerability where an attacker can achieve remote code execution. The vulnerability exists in the `add_deployment` function, which decodes and decrypts environment variables from base64 and assigns them to `os.environ`. An attacker can exploit this by sending a malicious payload to the `/config/update` endpoint, which is then processed and executed by the server when the `get_secret` function is triggered. This requires the server to use Google KMS and a database to store a model.

EPSS

Процентиль: 90%
0.05359
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-94