Code Injection Vulnerability in berriai/litellm Application
CVE-2024-4889
7.2HIGH
Summary
A vulnerability exists in the berriai/litellm application, specifically in version 1.34.6, due to improper handling of user input within the secret management system's eval function. Attackers can exploit this weakness by providing a crafted input that modifies the UI_LOGO_PATH variable to point to a malicious remote server. This enables them to write a compromised Google KMS configuration file, stored in cached_logo.jpg, which can then facilitate arbitrary code execution. The risk is linked to the operational use of the Google KMS feature, emphasizing the need for stringent input validation and security practices in applications.
Affected Version(s)
berriai/litellm <= unspecified
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved