CVE-2024-6587
HIGH EXPLOITED NUCLEIberriai/litellm <1.38.10 - SSRF
Title source: llmDescription
A Server-Side Request Forgery (SSRF) vulnerability exists in berriai/litellm version 1.38.10. This vulnerability allows users to specify the `api_base` parameter when making requests to `POST /chat/completions`, causing the application to send the request to the domain specified by `api_base`. This request includes the OpenAI API key. A malicious user can set the `api_base` to their own domain and intercept the OpenAI API key, leading to unauthorized access and potential misuse of the API key.
Nuclei Templates (1)
LiteLLM - Server-Side Request Forgery
HIGHVERIFIEDby pdresearch,iamnoooob,rootxharsh,lambdasawa
Shodan:
http.favicon.hash:439373620
Scores
CVSS v3
7.5
EPSS
0.8837
EPSS Percentile
99.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2024-08-22
CWE
CWE-918
Status
published
Products (2)
litellm/litellm
1.38.10
pypi/litellm
0 - 1.44.8PyPI
Published
Sep 13, 2024
Tracked Since
Feb 18, 2026