A Server-Side Request Forgery (SSRF) vulnerability exists in berriai/litellm version 1.38.10. This vulnerability allows users to specify the `api_base` parameter when making requests to `POST /chat/completions`, causing the application to send the request to the domain specified by `api_base`. This request includes the OpenAI API key. A malicious user can set the `api_base` to their own domain and intercept the OpenAI API key, leading to unauthorized access and potential misuse of the API key.
References
Link | Resource |
---|---|
https://github.com/berriai/litellm/commit/ba1912afd1b19e38d3704bb156adf887f91ae1e0 | Patch |
https://huntr.com/bounties/4001e1a2-7b7a-4776-a3ae-e6692ec3d997 | Exploit Third Party Advisory |
Configurations
History
20 Sep 2024, 14:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:litellm:litellm:1.38.10:*:*:*:*:*:*:* | |
First Time |
Litellm
Litellm litellm |
|
Summary |
|
|
References | () https://github.com/berriai/litellm/commit/ba1912afd1b19e38d3704bb156adf887f91ae1e0 - Patch | |
References | () https://huntr.com/bounties/4001e1a2-7b7a-4776-a3ae-e6692ec3d997 - Exploit, Third Party Advisory |
13 Sep 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-13 16:15
Updated : 2024-09-20 14:55
NVD link : CVE-2024-6587
Mitre link : CVE-2024-6587
CVE.ORG link : CVE-2024-6587
JSON object : View
Products Affected
litellm
- litellm
CWE
CWE-918
Server-Side Request Forgery (SSRF)