icon

We found results for “

CVE-2024-4889

Good to know:

icon

Date: June 6, 2024

A code injection vulnerability exists in the berriai/litellm application, version 1.34.6, due to the use of unvalidated input in the eval function within the secret management system. This vulnerability requires a valid Google KMS configuration file to be exploitable. Specifically, by setting the "UI_LOGO_PATH" variable to a remote server address in the "get_image" function, an attacker can write a malicious Google KMS configuration file to the "cached_logo.jpg" file. This file can then be used to execute arbitrary code by assigning malicious code to the "SAVE_CONFIG_TO_DB" environment variable, leading to full system control. The vulnerability is contingent upon the use of the Google KMS feature.

Language: Python

Severity Score

Severity Score

Weakness Type (CWE)

Improper Control of Generation of Code ('Code Injection')

CWE-94

Top Fix

icon

Upgrade Version

Upgrade to version litellm - 1.40.8

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): HIGH
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us