We found results for “”
CVE-2024-6587
Good to know:
Date: September 13, 2024
A Server-Side Request Forgery (SSRF) vulnerability exists in berriai/litellm version 1.38.10. This vulnerability allows users to specify the "api_base" parameter when making requests to "POST /chat/completions", causing the application to send the request to the domain specified by "api_base". This request includes the OpenAI API key. A malicious user can set the "api_base" to their own domain and intercept the OpenAI API key, leading to unauthorized access and potential misuse of the API key.
Language: Python
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Server-Side Request Forgery (SSRF)
CWE-918Top Fix
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | NONE |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


