CVE-2024-6587 – SSRF in berriai/litellm
https://notcve.org/view.php?id=CVE-2024-6587
13 Sep 2024 — A Server-Side Request Forgery (SSRF) vulnerability exists in berriai/litellm version 1.38.10. This vulnerability allows users to specify the `api_base` parameter when making requests to `POST /chat/completions`, causing the application to send the request to the domain specified by `api_base`. This request includes the OpenAI API key. A malicious user can set the `api_base` to their own domain and intercept the OpenAI API key, leading to unauthorized access and potential misuse of the API key. • https://huntr.com/bounties/4001e1a2-7b7a-4776-a3ae-e6692ec3d997 • CWE-918: Server-Side Request Forgery (SSRF) •
CVE-2024-5710 – Improper Access Control in Team Management in berriai/litellm
https://notcve.org/view.php?id=CVE-2024-5710
27 Jun 2024 — berriai/litellm version 1.34.34 is vulnerable to improper access control in its team management functionality. This vulnerability allows attackers to perform unauthorized actions such as creating, updating, viewing, deleting, blocking, and unblocking any teams, as well as adding or deleting any member to or from any teams. The vulnerability stems from insufficient access control checks in various team management endpoints, enabling attackers to exploit these functionalities without proper authorization. • https://huntr.com/bounties/70897f59-a966-4d93-b71e-745e3da91970 • CWE-284: Improper Access Control •
CVE-2024-5751 – Remote Code Execution in BerriAI/litellm
https://notcve.org/view.php?id=CVE-2024-5751
27 Jun 2024 — BerriAI/litellm version v1.35.8 contains a vulnerability where an attacker can achieve remote code execution. The vulnerability exists in the `add_deployment` function, which decodes and decrypts environment variables from base64 and assigns them to `os.environ`. An attacker can exploit this by sending a malicious payload to the `/config/update` endpoint, which is then processed and executed by the server when the `get_secret` function is triggered. This requires the server to use Google KMS and a database ... • https://huntr.com/bounties/ae623c2f-b64b-4245-9ed4-f13a0a5824ce • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2024-4888 – Arbitrary File Deletion in BerriAI/litellm
https://notcve.org/view.php?id=CVE-2024-4888
06 Jun 2024 — BerriAI's litellm, in its latest version, is vulnerable to arbitrary file deletion due to improper input validation on the `/audio/transcriptions` endpoint. An attacker can exploit this vulnerability by sending a specially crafted request that includes a file path to the server, which then deletes the specified file without proper authorization or validation. This vulnerability is present in the code where `os.remove(file.filename)` is used to delete a file, allowing any user to delete critical files on the... • https://huntr.com/bounties/48461d89-cf13-4ad3-a43e-0d37da08fc6c • CWE-20: Improper Input Validation CWE-862: Missing Authorization •
CVE-2024-4890 – Blind SQL Injection in berriai/litellm
https://notcve.org/view.php?id=CVE-2024-4890
06 Jun 2024 — A blind SQL injection vulnerability exists in the berriai/litellm application, specifically within the '/team/update' process. The vulnerability arises due to the improper handling of the 'user_id' parameter in the raw SQL query used for deleting users. An attacker can exploit this vulnerability by injecting malicious SQL commands through the 'user_id' parameter, leading to potential unauthorized access to sensitive information such as API keys, user information, and tokens stored in the database. The affec... • https://huntr.com/bounties/a4f6d357-5b44-4e00-9cac-f1cc351211d2 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-5225 – SQL Injection in berriai/litellm
https://notcve.org/view.php?id=CVE-2024-5225
06 Jun 2024 — An SQL Injection vulnerability exists in the berriai/litellm repository, specifically within the `/global/spend/logs` endpoint. The vulnerability arises due to improper neutralization of special elements used in an SQL command. The affected code constructs an SQL query by concatenating an unvalidated `api_key` parameter directly into the query, making it susceptible to SQL Injection if the `api_key` contains malicious data. This issue affects the latest version of the repository. Successful exploitation of ... • https://huntr.com/bounties/491e4884-0306-4cd4-8fe2-9a19de33bf5c • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •