Логотип exploitDog
bind:CVE-2024-4888
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-4888

Количество 2

Количество 2

nvd логотип

CVE-2024-4888

больше 1 года назад

BerriAI's litellm, in its latest version, is vulnerable to arbitrary file deletion due to improper input validation on the `/audio/transcriptions` endpoint. An attacker can exploit this vulnerability by sending a specially crafted request that includes a file path to the server, which then deletes the specified file without proper authorization or validation. This vulnerability is present in the code where `os.remove(file.filename)` is used to delete a file, allowing any user to delete critical files on the server such as SSH keys, SQLite databases, or configuration files.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-3xr8-qfvj-9p9j

больше 1 года назад

Arbitrary file deletion in litellm

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-4888

BerriAI's litellm, in its latest version, is vulnerable to arbitrary file deletion due to improper input validation on the `/audio/transcriptions` endpoint. An attacker can exploit this vulnerability by sending a specially crafted request that includes a file path to the server, which then deletes the specified file without proper authorization or validation. This vulnerability is present in the code where `os.remove(file.filename)` is used to delete a file, allowing any user to delete critical files on the server such as SSH keys, SQLite databases, or configuration files.

CVSS3: 8.1
0%
Низкий
больше 1 года назад
github логотип
GHSA-3xr8-qfvj-9p9j

Arbitrary file deletion in litellm

CVSS3: 6.5
0%
Низкий
больше 1 года назад

Уязвимостей на страницу