Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wc36-9694-f9rf

Опубликовано: 17 сент. 2024
Источник: github
Github: Прошло ревью
CVSS4: 6.9
CVSS3: 6.2

Описание

vLLM Denial of Service via the best_of parameter

A vulnerability was found in the ilab model serve component, where improper handling of the best_of parameter in the vllm JSON web API can lead to a Denial of Service (DoS). The API used for LLM-based sentence or chat completion accepts a best_of parameter to return the best completion from several options. When this parameter is set to a large value, the API does not handle timeouts or resource exhaustion properly, allowing an attacker to cause a DoS by consuming excessive system resources. This leads to the API becoming unresponsive, preventing legitimate users from accessing the service.

Пакеты

Наименование

vllm

pip
Затронутые версииВерсия исправления

<= 0.5.0.post1

Отсутствует

EPSS

Процентиль: 12%
0.00039
Низкий

6.9 Medium

CVSS4

6.2 Medium

CVSS3

Дефекты

CWE-400

Связанные уязвимости

CVSS3: 6.2
redhat
больше 1 года назад

A vulnerability was found in the ilab model serve component, where improper handling of the best_of parameter in the vllm JSON web API can lead to a Denial of Service (DoS). The API used for LLM-based sentence or chat completion accepts a best_of parameter to return the best completion from several options. When this parameter is set to a large value, the API does not handle timeouts or resource exhaustion properly, allowing an attacker to cause a DoS by consuming excessive system resources. This leads to the API becoming unresponsive, preventing legitimate users from accessing the service.

CVSS3: 6.2
nvd
больше 1 года назад

A vulnerability was found in the ilab model serve component, where improper handling of the best_of parameter in the vllm JSON web API can lead to a Denial of Service (DoS). The API used for LLM-based sentence or chat completion accepts a best_of parameter to return the best completion from several options. When this parameter is set to a large value, the API does not handle timeouts or resource exhaustion properly, allowing an attacker to cause a DoS by consuming excessive system resources. This leads to the API becoming unresponsive, preventing legitimate users from accessing the service.

EPSS

Процентиль: 12%
0.00039
Низкий

6.9 Medium

CVSS4

6.2 Medium

CVSS3

Дефекты

CWE-400