litellm vulnerable to remote code execution based on using eval unsafely
Critical severity
GitHub Reviewed
Published
Jun 27, 2024
to the GitHub Advisory Database
•
Updated Jun 28, 2024
Description
Published by the National Vulnerability Database
Jun 27, 2024
Published to the GitHub Advisory Database
Jun 27, 2024
Reviewed
Jun 28, 2024
Last updated
Jun 28, 2024
BerriAI/litellm version v1.35.8 contains a vulnerability where an attacker can achieve remote code execution. The vulnerability exists in the
add_deployment
function, which decodes and decrypts environment variables from base64 and assigns them toos.environ
. An attacker can exploit this by sending a malicious payload to the/config/update
endpoint, which is then processed and executed by the server when theget_secret
function is triggered. This requires the server to use Google KMS and a database to store a model.References