Описание
BerriAI/litellm is vulnerable to Server-Side Template Injection (SSTI) via the /completions endpoint. The vulnerability arises from the hf_chat_template method processing the chat_template parameter from the tokenizer_config.json file through the Jinja template engine without proper sanitization. Attackers can exploit this by crafting malicious tokenizer_config.json files that execute arbitrary code on the server.
Ссылки
- Patch
- ExploitThird Party Advisory
- Patch
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.34.42 (исключая)
cpe:2.3:a:litellm:litellm:*:*:*:*:*:*:*:*
EPSS
Процентиль: 80%
0.0145
Низкий
9.8 Critical
CVSS3
Дефекты
CWE-76
Связанные уязвимости
CVSS3: 9.8
github
почти 2 года назад
LiteLLM has Server-Side Template Injection vulnerability in /completions endpoint
EPSS
Процентиль: 80%
0.0145
Низкий
9.8 Critical
CVSS3
Дефекты
CWE-76