Vulnerability Description
A remote code execution (RCE) vulnerability exists in the berriai/litellm project due to improper control of the generation of code when using the `eval` function unsafely in the `litellm.get_secret()` method. Specifically, when the server utilizes Google KMS, untrusted data is passed to the `eval` function without any sanitization. Attackers can exploit this vulnerability by injecting malicious values into environment variables through the `/config/update` endpoint, which allows for the update of settings in `proxy_server_config.yaml`.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/a3221b0c-6e25-4295-ab0f-042997e8fc61
- https://huntr.com/bounties/a3221b0c-6e25-4295-ab0f-042997e8fc61
FAQ
What is CVE-2024-4264?
CVE-2024-4264 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A remote code execution (RCE) vulnerability exists in the berriai/litellm project due to improper control of the generation of code when using the `eval` function unsafely in the `litellm.get_secret()...
How severe is CVE-2024-4264?
CVE-2024-4264 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-4264?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.