A code injection vulnerability exists in the berriai...
High severity
Unreviewed
Published
Jun 6, 2024
to the GitHub Advisory Database
•
Updated Jun 6, 2024
Description
Published by the National Vulnerability Database
Jun 6, 2024
Published to the GitHub Advisory Database
Jun 6, 2024
Last updated
Jun 6, 2024
A code injection vulnerability exists in the berriai/litellm application, version 1.34.6, due to the use of unvalidated input in the eval function within the secret management system. This vulnerability requires a valid Google KMS configuration file to be exploitable. Specifically, by setting the
UI_LOGO_PATH
variable to a remote server address in theget_image
function, an attacker can write a malicious Google KMS configuration file to thecached_logo.jpg
file. This file can then be used to execute arbitrary code by assigning malicious code to theSAVE_CONFIG_TO_DB
environment variable, leading to full system control. The vulnerability is contingent upon the use of the Google KMS feature.References