Home » Database

AVID-2026-R1579

Description

Remote Code Execution in BerriAI/litellm (CVE-2024-5751)

Details

BerriAI/litellm version v1.35.8 contains a vulnerability where an attacker can achieve remote code execution. The vulnerability exists in the add_deployment function, which decodes and decrypts environment variables from base64 and assigns them to os.environ. An attacker can exploit this by sending a malicious payload to the /config/update endpoint, which is then processed and executed by the server when the get_secret function is triggered. This requires the server to use Google KMS and a database to store a model.

Reason for inclusion in AVID: CVE-2024-5751 describes a remote code execution vulnerability in BerriAI/litellm, an AI deployment/serving component. The flaw arises during deployment configuration processing, enabling an attacker to execute code on the server, which directly impacts the AI software stack used to build/run general-purpose AI systems. This is a software supply-chain issue affecting AI model deployment infrastructure, not hardware/firmware-only. The report provides explicit vulnerability behavior (RCE) and affected components, enabling AVID curation decisions.

References

Affected or Relevant Artifacts

  • Developer: berriai
  • Deployer: berriai
  • Artifact Details:
TypeName
Systemberriai/litellm

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score9.8
Base Severity🔴 Critical
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-94CWE-94 Improper Control of Generation of Code

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-06-27
  • Version: 0.3.3
  • AVID Entry