Arbitrary File Deletion Vulnerability in BerriAI's littellm
CVE-2024-4888
8.1HIGH
Key Information:
- Vendor
- Berriai
- Status
- Berriai/litellm
- Vendor
- CVE Published:
- 6 June 2024
Summary
BerriAI's litellm suffers from a significant vulnerability that allows for arbitrary file deletion due to inadequate input validation on the /audio/transcriptions
endpoint. By crafting a malicious request that specifies a file path, an attacker can exploit this flaw to delete any file on the server, bypassing necessary authorization checks. The vulnerability stems from the improper use of the os.remove(file.filename)
function, enabling unauthorized users to erase sensitive files, including SSH keys, SQLite databases, and configuration files. This poses a considerable risk to the integrity and security of the affected systems.
Affected Version(s)
berriai/litellm <= unspecified
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved