Описание
A remote code execution (RCE) vulnerability exists in the berriai/litellm project due to improper control of the generation of code when using the eval function unsafely in the litellm.get_secret() method. Specifically, when the server utilizes Google KMS, untrusted data is passed to the eval function without any sanitization. Attackers can exploit this vulnerability by injecting malicious values into environment variables through the /config/update endpoint, which allows for the update of settings in proxy_server_config.yaml.
EPSS
Процентиль: 91%
0.06167
Низкий
9.8 Critical
CVSS3
Дефекты
CWE-94
Связанные уязвимости
CVSS3: 7.2
github
больше 1 года назад
litellm passes untrusted data to `eval` function without sanitization
EPSS
Процентиль: 91%
0.06167
Низкий
9.8 Critical
CVSS3
Дефекты
CWE-94