1.67.0.post1
1 years ago
5 hours ago
Known vulnerabilities in the litellm package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
litellm is a Library to easily interface with LLM API providers Affected versions of this package are vulnerable to Incorrect Permission Assignment for Critical Resource on the Azure OpenAI route. The How to fix Incorrect Permission Assignment for Critical Resource? Upgrade | [,1.64.1) |
litellm is a Library to easily interface with LLM API providers Affected versions of this package are vulnerable to Denial of Service (DoS) through the use of How to fix Denial of Service (DoS)? Upgrade | [,1.53.1) |
litellm is a Library to easily interface with LLM API providers Affected versions of this package are vulnerable to Improper Output Neutralization for Logs due to the incomplete masking of API keys in the logging functionality. An attacker can expose sensitive information by accessing the application logs. How to fix Improper Output Neutralization for Logs? Upgrade | [,1.44.12) |
litellm is a Library to easily interface with LLM API providers Affected versions of this package are vulnerable to Improper Authorization due to the overly privileged API key assigned to How to fix Improper Authorization? Upgrade | [,1.61.15) |
litellm is a Library to easily interface with LLM API providers Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling through the processing of multipart boundaries in HTTP requests. An attacker can cause excessive resource consumption and render the service unavailable by appending characters to the end of a multipart boundary. How to fix Allocation of Resources Without Limits or Throttling? Upgrade | [,1.56.2) |
litellm is a Library to easily interface with LLM API providers Affected versions of this package are vulnerable to Arbitrary Command Injection through the How to fix Arbitrary Command Injection? Upgrade | [,1.65.5) |
litellm is a Library to easily interface with LLM API providers Affected versions of this package are vulnerable to Exposure of Sensitive Information Through Metadata due to an issue in How to fix Exposure of Sensitive Information Through Metadata? Upgrade | [,1.65.5) |
litellm is a Library to easily interface with LLM API providers Affected versions of this package are vulnerable to Incorrect Permission Assignment for Critical Resource in the How to fix Incorrect Permission Assignment for Critical Resource? Upgrade | [,1.60.4) |
litellm is a Library to easily interface with LLM API providers Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) via the How to fix Server-Side Request Forgery (SSRF)? Upgrade | [,1.44.8) |
litellm is a Library to easily interface with LLM API providers Affected versions of this package are vulnerable to Code Injection via the How to fix Code Injection? Upgrade | [,1.40.16) |
litellm is a Library to easily interface with LLM API providers Affected versions of this package are vulnerable to Code Injection due to the use of unvalidated input in the How to fix Code Injection? Upgrade | [,1.34.39) |
litellm is a Library to easily interface with LLM API providers Affected versions of this package are vulnerable to SQL Injection through the How to fix SQL Injection? Upgrade | [,1.40.0) |
litellm is a Library to easily interface with LLM API providers Affected versions of this package are vulnerable to SQL Injection through the How to fix SQL Injection? Upgrade | [,1.49.6) |
litellm is a Library to easily interface with LLM API providers Affected versions of this package are vulnerable to Improper Control of Generation of Code ('Code Injection') via the How to fix Improper Control of Generation of Code ('Code Injection')? Upgrade | [,1.40.16) |
litellm is a Library to easily interface with LLM API providers Affected versions of this package are vulnerable to Improper Access Control due to the Proxy using a hardcoded demo account with no permissions, posing a potential security risk. How to fix Improper Access Control? Upgrade | [,1.35.1) |
litellm is a Library to easily interface with LLM API providers Affected versions of this package are vulnerable to Improper Access Control where users could inadvertently delete files from the proxy server when accessing the How to fix Improper Access Control? Upgrade | [,1.35.18) |
litellm is a Library to easily interface with LLM API providers Affected versions of this package are vulnerable to Improper Neutralization of Special Elements used in a Template Engine ('Template Injection') due to the How to fix Improper Neutralization of Special Elements used in a Template Engine ('Template Injection')? Upgrade | [,1.34.42) |