/ data / vuln_en / LiteLLM / CVE-2024-4890.yaml
CVE-2024-4890.yaml
 1  info:
 2    name: LiteLLM
 3    cve: CVE-2024-4890
 4    summary: SQL injection vulnerability in litellm's '/team/update' process.
 5    details: |
 6      A blind SQL injection vulnerability exists in the berriai/litellm application, specifically within the '/team/update' process. 
 7      The vulnerability arises due to the improper handling of the 'user_id' parameter in the raw SQL query used for deleting users. 
 8      An attacker can exploit this vulnerability by injecting malicious SQL commands through the 'user_id' parameter, leading to potential 
 9      unauthorized access to sensitive information such as API keys, user information, and tokens stored in the database. 
10      The affected version is 1.27.14.
11    cvss: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
12    severity: HIGH
13    security_advise: |
14      1. Upgrade to a patched version of litellm.
15      2. Implement proper input validation and parameterized queries to prevent SQL injection.
16      3. Review and sanitize all user-supplied input before using it in database queries.
17  rule: version <= "1.27.14"
18  references:
19    - https://nvd.nist.gov/vuln/detail/CVE-2024-4890
20    - https://github.com/BerriAI/litellm/pull/2954
21    - https://github.com/BerriAI/litellm
22    - https://huntr.com/bounties/a4f6d357-5b44-4e00-9cac-f1cc351211d2