Arbitrary file deletion in litellm
High severity
GitHub Reviewed
Published
Jun 6, 2024
to the GitHub Advisory Database
•
Updated Nov 4, 2024
Description
Published by the National Vulnerability Database
Jun 6, 2024
Published to the GitHub Advisory Database
Jun 6, 2024
Reviewed
Jun 6, 2024
Last updated
Nov 4, 2024
BerriAI's litellm, in its latest version, is vulnerable to arbitrary file deletion due to improper input validation on the
/audio/transcriptions
endpoint. An attacker can exploit this vulnerability by sending a specially crafted request that includes a file path to the server, which then deletes the specified file without proper authorization or validation. This vulnerability is present in the code whereos.remove(file.filename)
is used to delete a file, allowing any user to delete critical files on the server such as SSH keys, SQLite databases, or configuration files.References