A remote code execution (RCE) vulnerability exists in the berriai/litellm project due to improper control of the generation of code when using the `eval` function unsafely in the `litellm.get_secret()` method. Specifically, when the server utilizes Google KMS, untrusted data is passed to the `eval` function without any sanitization. Attackers can exploit this vulnerability by injecting malicious values into environment variables through the `/config/update` endpoint, which allows for the update of settings in `proxy_server_config.yaml`.
References
Configurations
No configuration.
History
21 Nov 2024, 09:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/a3221b0c-6e25-4295-ab0f-042997e8fc61 - | |
Summary |
|
18 May 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-18 00:15
Updated : 2024-11-21 09:42
NVD link : CVE-2024-4264
Mitre link : CVE-2024-4264
CVE.ORG link : CVE-2024-4264
JSON object : View
Products Affected
No product.
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')