Skip to content
Threat Feed
critical advisory

LiteLLM Remote Code Execution Vulnerability

A remote, authenticated attacker can exploit a vulnerability in LiteLLM to execute arbitrary code with administrator privileges.

A vulnerability exists in LiteLLM that could allow a remote, authenticated attacker to execute arbitrary code with administrator privileges. The vulnerability allows an attacker to compromise the system by injecting malicious code that the application will execute. The exact nature of the vulnerability is not specified, but the impact is significant due to the potential for complete system takeover. Defenders should prioritize detection and patching of LiteLLM instances.

Attack Chain

  1. The attacker authenticates to the LiteLLM instance.
  2. The attacker crafts a malicious request containing a payload designed to exploit the vulnerability.
  3. The malicious request is sent to the vulnerable LiteLLM endpoint.
  4. LiteLLM processes the request without proper sanitization or validation.
  5. The injected code is executed within the context of the LiteLLM process, with administrator privileges.
  6. The attacker gains control over the LiteLLM server.
  7. The attacker installs malware, backdoors, or performs other malicious actions.
  8. The attacker compromises other systems on the network or exfiltrates sensitive data.

Impact

Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary code with administrator privileges on the affected LiteLLM instance. This can lead to complete system compromise, data theft, deployment of ransomware, and further lateral movement within the network. The impact is considered critical due to the high level of access gained by the attacker.

Recommendation

  • Deploy the Sigma rules provided to detect potential exploitation attempts against LiteLLM in your environment.
  • Monitor LiteLLM logs for suspicious activity and unauthorized access attempts using the provided rule.
  • Investigate and remediate any alerts generated by the detection rules to prevent further compromise.

Detection coverage 2

Detect LiteLLM Suspicious Process Execution

high

Detects suspicious processes being executed by LiteLLM which may indicate a code injection vulnerability.

sigma tactics: execution techniques: T1203 sources: process_creation, linux

Detect LiteLLM Network Connection to Unusual Port

medium

Detects network connections initiated by LiteLLM to ports that are not commonly associated with its normal operation, potentially indicating command and control activity.

sigma tactics: command_and_control techniques: T1071 sources: network_connection, linux

Detection queries are available on the platform. Get full rules →