Vulnerability Description
A Server-Side Request Forgery (SSRF) vulnerability exists in berriai/litellm version 1.38.10. This vulnerability allows users to specify the `api_base` parameter when making requests to `POST /chat/completions`, causing the application to send the request to the domain specified by `api_base`. This request includes the OpenAI API key. A malicious user can set the `api_base` to their own domain and intercept the OpenAI API key, leading to unauthorized access and potential misuse of the API key.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Litellm | Litellm | 1.38.10 |
Related Weaknesses (CWE)
References
- https://github.com/berriai/litellm/commit/ba1912afd1b19e38d3704bb156adf887f91ae1Patch
- https://huntr.com/bounties/4001e1a2-7b7a-4776-a3ae-e6692ec3d997ExploitThird Party Advisory
FAQ
What is CVE-2024-6587?
CVE-2024-6587 is a vulnerability with a CVSS score of 7.5 (HIGH). A Server-Side Request Forgery (SSRF) vulnerability exists in berriai/litellm version 1.38.10. This vulnerability allows users to specify the `api_base` parameter when making requests to `POST /chat/co...
How severe is CVE-2024-6587?
CVE-2024-6587 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-6587?
Check the references section above for vendor advisories and patch information. Affected products include: Litellm Litellm.