icon

We found results for “

CVE-2024-5751

Good to know:

icon
icon

Date: June 27, 2024

BerriAI/litellm version v1.35.8 contains a vulnerability where an attacker can achieve remote code execution. The vulnerability exists in the "add_deployment" function, which decodes and decrypts environment variables from base64 and assigns them to "os.environ". An attacker can exploit this by sending a malicious payload to the "/config/update" endpoint, which is then processed and executed by the server when the "get_secret" function is triggered. This requires the server to use Google KMS and a database to store a model.

Language: Python

Severity Score

Severity Score

Weakness Type (CWE)

Improper Control of Generation of Code ('Code Injection')

CWE-94

Top Fix

icon

Upgrade Version

Upgrade to version litellm - 1.40.16

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us