Arbitrary File Deletion Vulnerability in BerriAI's littellm
CVE-2024-4888

8.1HIGH

Key Information:

Vendor
Berriai
Status
Berriai/litellm
Vendor
CVE Published:
6 June 2024

Summary

BerriAI's litellm suffers from a significant vulnerability that allows for arbitrary file deletion due to inadequate input validation on the /audio/transcriptions endpoint. By crafting a malicious request that specifies a file path, an attacker can exploit this flaw to delete any file on the server, bypassing necessary authorization checks. The vulnerability stems from the improper use of the os.remove(file.filename) function, enabling unauthorized users to erase sensitive files, including SSH keys, SQLite databases, and configuration files. This poses a considerable risk to the integrity and security of the affected systems.

Affected Version(s)

berriai/litellm <= unspecified

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
πŸͺ This website uses cookies, like every other website on the internet πŸ˜• By using our website, you consent to the use of cookies.