Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rxc4-3w6r-4v47

Опубликовано: 21 авг. 2025
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

vllm API endpoints vulnerable to Denial of Service Attacks

Summary

A Denial of Service (DoS) vulnerability can be triggered by sending a single HTTP GET request with an extremely large header to an HTTP endpoint. This results in server memory exhaustion, potentially leading to a crash or unresponsiveness. The attack does not require authentication, making it exploitable by any remote user.

Details

The vulnerability leverages the abuse of HTTP headers. By setting a header such as X-Forwarded-For to a very large value like ("A" * 5_800_000_000), the server's HTTP parser or application logic may attempt to load the entire request into memory, overwhelming system resources.

Impact

What kind of vulnerability is it? Who is impacted? Type of vulnerability: Denial of Service (DoS)

Resolution

Upgrade to a version of vLLM that includes appropriate HTTP limits by deafult, or use a proxy in front of vLLM which provides protection against this issue.

Пакеты

Наименование

vllm

pip
Затронутые версииВерсия исправления

>= 0.1.0, < 0.10.1.1

0.10.1.1

EPSS

Процентиль: 58%
0.00371
Низкий

7.5 High

CVSS3

Дефекты

CWE-400

Связанные уязвимости

CVSS3: 7.5
redhat
4 месяца назад

vLLM is an inference and serving engine for large language models (LLMs). From 0.1.0 to before 0.10.1.1, a Denial of Service (DoS) vulnerability can be triggered by sending a single HTTP GET request with an extremely large header to an HTTP endpoint. This results in server memory exhaustion, potentially leading to a crash or unresponsiveness. The attack does not require authentication, making it exploitable by any remote user. This vulnerability is fixed in 0.10.1.1.

CVSS3: 7.5
nvd
4 месяца назад

vLLM is an inference and serving engine for large language models (LLMs). From 0.1.0 to before 0.10.1.1, a Denial of Service (DoS) vulnerability can be triggered by sending a single HTTP GET request with an extremely large header to an HTTP endpoint. This results in server memory exhaustion, potentially leading to a crash or unresponsiveness. The attack does not require authentication, making it exploitable by any remote user. This vulnerability is fixed in 0.10.1.1.

CVSS3: 7.5
debian
4 месяца назад

vLLM is an inference and serving engine for large language models (LLM ...

EPSS

Процентиль: 58%
0.00371
Низкий

7.5 High

CVSS3

Дефекты

CWE-400