{"vulnerability": "CVE-2024-2952", "sightings": [{"uuid": "405de2fe-30da-480a-b175-ceda49a3d241", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2952", "type": "seen", "source": "https://t.me/arpsyndicate/4564", "content": "#ExploitObserverAlert\n\nCVE-2024-2952\n\nDESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-2952. BerriAI/litellm is vulnerable to Server-Side Template Injection (SSTI) via the `/completions` endpoint. The vulnerability arises from the `hf_chat_template` method processing the `chat_template` parameter from the `tokenizer_config.json` file through the Jinja template engine without proper sanitization. Attackers can exploit this by crafting malicious `tokenizer_config.json` files that execute arbitrary code on the server.\n\nFIRST-EPSS: 0.000430000\nARPS-EXPLOITABILITY: 0.5780347", "creation_timestamp": "2024-04-12T08:26:51.000000Z"}]}