Remote Code Execution Vulnerability in BerriAI/litellm Affected by Google KMS
CVE-2024-5751

9.8CRITICAL

Key Information:

Vendor

Berriai

Vendor
CVE Published:
27 June 2024

What is CVE-2024-5751?

In BerriAI/litellm version v1.35.8, a remote code execution vulnerability arises within the add_deployment function. This flaw permits attackers to decode and decrypt environment variables from base64, leading to unauthorized command execution. Exploitation occurs when a harmful payload is sent to the /config/update endpoint, which the server processes during the execution of the get_secret function. Effective exploitation necessitates the server's integration with Google KMS and a database used for model storage, exposing systems to substantial risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

berriai/litellm <= unspecified

References

EPSS Score

5% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

CVSS V3.0

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.