PyPi: Litellm

CVE-2024-4264

Safety vulnerability ID: 71722

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at May 18, 2024 Updated at Nov 22, 2024
Scan your Python projects for vulnerabilities →

Advisory

Affected versions of berriai/litellm contains a Remote Code Execution (RCE) vulnerability (CWE-94) in the secret management system, particularly when using Google KMS. The litellm.get_secret() method used the eval() function unsafely on unsanitized input from environment variables, which could be manipulated through the /config/update endpoint. This allowed attackers to inject and execute arbitrary code by updating settings in proxy_server_config.yaml. The vulnerability has been addressed by replacing the unsafe eval() call with a secure client.decrypt() method for handling encrypted data.

Affected package

litellm

Latest version: 1.52.14

Library to easily interface with LLM API providers

Affected versions

Fixed versions

Vulnerability changelog

This vulnerability has no description

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application