Логотип exploitDog
bind:CVE-2024-4264
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-4264

Количество 2

Количество 2

nvd логотип

CVE-2024-4264

больше 1 года назад

A remote code execution (RCE) vulnerability exists in the berriai/litellm project due to improper control of the generation of code when using the `eval` function unsafely in the `litellm.get_secret()` method. Specifically, when the server utilizes Google KMS, untrusted data is passed to the `eval` function without any sanitization. Attackers can exploit this vulnerability by injecting malicious values into environment variables through the `/config/update` endpoint, which allows for the update of settings in `proxy_server_config.yaml`.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-7ggm-4rjg-594w

больше 1 года назад

litellm passes untrusted data to `eval` function without sanitization

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-4264

A remote code execution (RCE) vulnerability exists in the berriai/litellm project due to improper control of the generation of code when using the `eval` function unsafely in the `litellm.get_secret()` method. Specifically, when the server utilizes Google KMS, untrusted data is passed to the `eval` function without any sanitization. Attackers can exploit this vulnerability by injecting malicious values into environment variables through the `/config/update` endpoint, which allows for the update of settings in `proxy_server_config.yaml`.

CVSS3: 9.8
6%
Низкий
больше 1 года назад
github логотип
GHSA-7ggm-4rjg-594w

litellm passes untrusted data to `eval` function without sanitization

CVSS3: 7.2
6%
Низкий
больше 1 года назад

Уязвимостей на страницу