Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Information Exposure vulnerabilities in an interactive lesson.
Start learningUpgrade litellm to version 1.80.11 or higher.
litellm is a Library to easily interface with LLM API providers
Affected versions of this package are vulnerable to Information Exposure due to improper masking of raw request headers in the pre_call method of litellm/litellm_core_utils/litellm_logging.py. An attacker can obtain exposed API keys by triggering failures on the /health endpoint, which causes unmasked Authorization headers containing credentials to be included in the error response via raw_request_typed_dict.
Note: Successful exploitation of this vulnerability requires the attacker to have access to the network traffic.