Remote Code Execution Vulnerability in BerriAI/litellm Affected by Google KMS
CVE-2024-5751
9.8CRITICAL
What is CVE-2024-5751?
In BerriAI/litellm version v1.35.8, a remote code execution vulnerability arises within the add_deployment function. This flaw permits attackers to decode and decrypt environment variables from base64, leading to unauthorized command execution. Exploitation occurs when a harmful payload is sent to the /config/update endpoint, which the server processes during the execution of the get_secret function. Effective exploitation necessitates the server's integration with Google KMS and a database used for model storage, exposing systems to substantial risk.
Affected Version(s)
berriai/litellm <= unspecified
References
EPSS Score
5% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
CVSS V3.0
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
