CVE-2024-4264
CVSS V2 None
CVSS V3 None
Description
A remote code execution (RCE) vulnerability exists in the berriai/litellm project due to improper control of the generation of code when using the `eval` function unsafely in the `litellm.get_secret()` method. Specifically, when the server utilizes Google KMS, untrusted data is passed to the `eval` function without any sanitization. Attackers can exploit this vulnerability by injecting malicious values into environment variables through the `/config/update` endpoint, which allows for the update of settings in `proxy_server_config.yaml`.
Overview
- CVE ID
- CVE-2024-4264
- Assigner
- @huntr_ai
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-05-18T00:00:15.222Z
- Last Modified Date
- 2024-05-18T00:00:15.222Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://huntr.com/bounties/a3221b0c-6e25-4295-ab0f-042997e8fc61 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-4264 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4264 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-23 22:28:22 | Added to TrackCVE |