High

litellm

SSRF vulnerability in chat completion endpoint

A Server-Side Request Forgery (SSRF) vulnerability in version 1.38.10 allows attackers to intercept OpenAI API keys by specifying a malicious `api_base` parameter. This issue has not yet been patched.

Available publicly on Jul 12 2024

7.5

CVSS:

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Credit:

lambdasawa
Remediation Steps
  • Update the application to validate the api_base parameter against a whitelist of allowed domains.
  • Implement server-side checks to ensure that the api_base parameter cannot be set to arbitrary domains.
  • Regularly rotate API keys and monitor for unauthorized usage.
  • Apply rate limiting and budget management controls directly within the OpenAI account settings.
Patch Details
  • Fixed Version: N/A
  • Patch Commit: N/A
Want more out of Sightline?

Sightline offers even more for premium customers

Go Premium

We have - related security advisories that are available with Sightline Premium.