An SQL Injection vulnerability exists in the berriai/litellm repository, specifically within the `/global/spend/logs` endpoint. The vulnerability arises due to improper neutralization of special elements used in an SQL command. The affected code constructs an SQL query by concatenating an unvalidated `api_key` parameter directly into the query, making it susceptible to SQL Injection if the `api_key` contains malicious data. This issue affects the latest version of the repository. Successful exploitation of this vulnerability could lead to unauthorized access, data manipulation, exposure of confidential information, and denial of service (DoS).
References
Link | Resource |
---|---|
https://huntr.com/bounties/491e4884-0306-4cd4-8fe2-9a19de33bf5c | Exploit Third Party Advisory |
https://huntr.com/bounties/491e4884-0306-4cd4-8fe2-9a19de33bf5c | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-06-06 19:16
Updated : 2024-11-21 09:47
NVD link : CVE-2024-5225
Mitre link : CVE-2024-5225
CVE.ORG link : CVE-2024-5225
JSON object : View
Products Affected
litellm
- litellm
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')