CVE-2024-4888

BerriAI's litellm, in its latest version, is vulnerable to arbitrary file deletion due to improper input validation on the `/audio/transcriptions` endpoint. An attacker can exploit this vulnerability by sending a specially crafted request that includes a file path to the server, which then deletes the specified file without proper authorization or validation. This vulnerability is present in the code where `os.remove(file.filename)` is used to delete a file, allowing any user to delete critical files on the server such as SSH keys, SQLite databases, or configuration files.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:litellm:litellm:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:43

Type Values Removed Values Added
Summary (en) BerriAI's litellm, in its latest version, is vulnerable to arbitrary file deletion due to improper input validation on the `/audio/transcriptions` endpoint. An attacker can exploit this vulnerability by sending a specially crafted request that includes a file path to the server, which then deletes the specified file without proper authorization or validation. This vulnerability is present in the code where `os.remove(file.filename)` is used to delete a file, allowing any user to delete critical files on the server such as SSH keys, SQLite databases, or configuration files. (en) BerriAI's litellm, in its latest version, is vulnerable to arbitrary file deletion due to improper input validation on the `/audio/transcriptions` endpoint. An attacker can exploit this vulnerability by sending a specially crafted request that includes a file path to the server, which then deletes the specified file without proper authorization or validation. This vulnerability is present in the code where `os.remove(file.filename)` is used to delete a file, allowing any user to delete critical files on the server such as SSH keys, SQLite databases, or configuration files.
References () https://huntr.com/bounties/48461d89-cf13-4ad3-a43e-0d37da08fc6c - Exploit, Third Party Advisory () https://huntr.com/bounties/48461d89-cf13-4ad3-a43e-0d37da08fc6c - Exploit, Third Party Advisory

03 Nov 2024, 17:15

Type Values Removed Values Added
CWE CWE-20

17 Oct 2024, 18:38

Type Values Removed Values Added
CPE cpe:2.3:a:litellm:litellm:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 8.1
References () https://huntr.com/bounties/48461d89-cf13-4ad3-a43e-0d37da08fc6c - () https://huntr.com/bounties/48461d89-cf13-4ad3-a43e-0d37da08fc6c - Exploit, Third Party Advisory
First Time Litellm
Litellm litellm
CWE CWE-862

07 Jun 2024, 14:56

Type Values Removed Values Added
Summary
  • (es) Litellm de BerriAI, en su última versión, es vulnerable a la eliminación arbitraria de archivos debido a una validación de entrada incorrecta en el endpoint `/audio/transcriptions`. Un atacante puede aprovechar esta vulnerabilidad enviando una solicitud especialmente manipulada que incluya una ruta de archivo al servidor, que luego elimina el archivo especificado sin la autorización o validación adecuada. Esta vulnerabilidad está presente en el código donde se usa `os.remove(file.filename)` para eliminar un archivo, lo que permite a cualquier usuario eliminar archivos críticos en el servidor, como claves SSH, bases de datos SQLite o archivos de configuración.

06 Jun 2024, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-06 19:16

Updated : 2024-11-21 09:43


NVD link : CVE-2024-4888

Mitre link : CVE-2024-4888

CVE.ORG link : CVE-2024-4888


JSON object : View

Products Affected

litellm

  • litellm
CWE
CWE-862

Missing Authorization