CVE-2024-4888
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/06/2024
Last modified:
03/11/2024
Description
BerriAI's litellm, in its latest version, is vulnerable to arbitrary file deletion due to improper input validation on the `/audio/transcriptions` endpoint. An attacker can exploit this vulnerability by sending a specially crafted request that includes a file path to the server, which then deletes the specified file without proper authorization or validation. This vulnerability is present in the code where `os.remove(file.filename)` is used to delete a file, allowing any user to delete critical files on the server such as SSH keys, SQLite databases, or configuration files.
Impact
Base Score 3.x
8.10
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:litellm:litellm:*:*:*:*:*:*:*:* | 1.35.19 (excluding) |
To consult the complete list of CPE names with products and versions, see this page