A remote code execution (RCE) vulnerability exists in the berriai/litellm project due to improper control of the generation of code when using the `eval` function unsafely in the `litellm.get_secret()` method. Specifically, when the server utilizes Google KMS, untrusted data is passed to the `eval` function without any sanitization. Attackers can exploit this vulnerability by injecting malicious values into environment variables through the `/config/update` endpoint, which allows for the update of settings in `proxy_server_config.yaml`.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-05-18T00:00:15.222Z
Updated: 2024-09-03T19:16:28.184Z
Reserved: 2024-04-26T17:24:03.780Z
Link: CVE-2024-4264
Vulnrichment
Updated: 2024-08-01T20:33:53.229Z
NVD
Status : Awaiting Analysis
Published: 2024-05-18T00:15:07.777
Modified: 2024-11-21T09:42:30.250
Link: CVE-2024-4264
Redhat
No data.