CVE-2024-8984: CWE-770 Allocation of Resources Without Limits or Throttling in berriai berriai/litellm
A Denial of Service (DoS) vulnerability exists in berriai/litellm version v1.44.5. This vulnerability can be exploited by appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request. The server continuously processes each character, leading to excessive resource consumption and rendering the service unavailable. The issue is unauthenticated and does not require any user interaction, impacting all users of the service.
AI Analysis
Technical Summary
CVE-2024-8984 is a Denial of Service vulnerability affecting berriai/litellm version v1.44.5, caused by improper resource allocation controls during HTTP multipart request processing. Specifically, the vulnerability is triggered when an attacker appends extra characters, such as dashes (-), to the end of a multipart boundary in an HTTP request. The server's multipart parser continuously processes each appended character without limits or throttling, leading to excessive CPU and memory consumption. This results in resource exhaustion, causing the service to become unresponsive or crash, effectively denying service to legitimate users. The vulnerability does not require any authentication or user interaction, allowing unauthenticated remote attackers to exploit it easily. The issue is classified under CWE-770, which involves allocation of resources without proper limits, a common cause of DoS conditions. Although no public exploits have been reported yet, the vulnerability's characteristics make it a significant risk, especially for publicly accessible services using the affected library. The CVSS v3.0 score of 7.5 reflects its high impact on availability with low attack complexity and no required privileges or user interaction.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of services relying on berriai/litellm, particularly those exposing HTTP multipart processing functionalities. Organizations in sectors such as cloud services, web hosting, software development, and any enterprise integrating this library into their applications could face service disruptions. The unauthenticated and remote nature of the exploit increases the likelihood of opportunistic attacks, potentially leading to downtime, loss of customer trust, and operational disruptions. Critical infrastructure providers or public-facing services in Europe could be targeted to cause widespread service outages. Additionally, the resource exhaustion could lead to cascading failures in dependent systems or increased operational costs due to mitigation efforts and incident response. The lack of known patches or exploits in the wild suggests a window of opportunity for attackers before organizations implement fixes.
Mitigation Recommendations
European organizations should first identify all instances of berriai/litellm in their environments, especially version v1.44.5 or unspecified affected versions. Until an official patch is released, implement network-level protections such as rate limiting and deep packet inspection to detect and block malformed multipart HTTP requests with suspicious boundary characters. Deploy Web Application Firewalls (WAFs) configured to recognize and mitigate abnormal multipart boundary patterns. Monitor server resource usage closely to detect early signs of exploitation attempts. Consider isolating or sandboxing services that process multipart requests to limit the blast radius of potential DoS attacks. Engage with the vendor or open-source maintainers to obtain or contribute to patches addressing the vulnerability. Finally, update incident response plans to include detection and mitigation strategies for multipart boundary-based DoS attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2024-8984: CWE-770 Allocation of Resources Without Limits or Throttling in berriai berriai/litellm
Description
A Denial of Service (DoS) vulnerability exists in berriai/litellm version v1.44.5. This vulnerability can be exploited by appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request. The server continuously processes each character, leading to excessive resource consumption and rendering the service unavailable. The issue is unauthenticated and does not require any user interaction, impacting all users of the service.
AI-Powered Analysis
Technical Analysis
CVE-2024-8984 is a Denial of Service vulnerability affecting berriai/litellm version v1.44.5, caused by improper resource allocation controls during HTTP multipart request processing. Specifically, the vulnerability is triggered when an attacker appends extra characters, such as dashes (-), to the end of a multipart boundary in an HTTP request. The server's multipart parser continuously processes each appended character without limits or throttling, leading to excessive CPU and memory consumption. This results in resource exhaustion, causing the service to become unresponsive or crash, effectively denying service to legitimate users. The vulnerability does not require any authentication or user interaction, allowing unauthenticated remote attackers to exploit it easily. The issue is classified under CWE-770, which involves allocation of resources without proper limits, a common cause of DoS conditions. Although no public exploits have been reported yet, the vulnerability's characteristics make it a significant risk, especially for publicly accessible services using the affected library. The CVSS v3.0 score of 7.5 reflects its high impact on availability with low attack complexity and no required privileges or user interaction.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of services relying on berriai/litellm, particularly those exposing HTTP multipart processing functionalities. Organizations in sectors such as cloud services, web hosting, software development, and any enterprise integrating this library into their applications could face service disruptions. The unauthenticated and remote nature of the exploit increases the likelihood of opportunistic attacks, potentially leading to downtime, loss of customer trust, and operational disruptions. Critical infrastructure providers or public-facing services in Europe could be targeted to cause widespread service outages. Additionally, the resource exhaustion could lead to cascading failures in dependent systems or increased operational costs due to mitigation efforts and incident response. The lack of known patches or exploits in the wild suggests a window of opportunity for attackers before organizations implement fixes.
Mitigation Recommendations
European organizations should first identify all instances of berriai/litellm in their environments, especially version v1.44.5 or unspecified affected versions. Until an official patch is released, implement network-level protections such as rate limiting and deep packet inspection to detect and block malformed multipart HTTP requests with suspicious boundary characters. Deploy Web Application Firewalls (WAFs) configured to recognize and mitigate abnormal multipart boundary patterns. Monitor server resource usage closely to detect early signs of exploitation attempts. Consider isolating or sandboxing services that process multipart requests to limit the blast radius of potential DoS attacks. Engage with the vendor or open-source maintainers to obtain or contribute to patches addressing the vulnerability. Finally, update incident response plans to include detection and mitigation strategies for multipart boundary-based DoS attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-09-18T20:50:25.840Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b2e178f764e1f470e95
Added to database: 10/15/2025, 1:01:34 PM
Last enriched: 10/15/2025, 1:08:56 PM
Last updated: 12/3/2025, 3:04:02 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13646: CWE-434 Unrestricted Upload of File with Dangerous Type in wpchill Image Gallery – Photo Grid & Video Gallery
HighCVE-2025-13645: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wpchill Image Gallery – Photo Grid & Video Gallery
HighCVE-2025-13448: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in anastis CSSIgniter Shortcodes
MediumCVE-2025-55181: Excessive Iteration (CWE-834) in Facebook proxygen
MediumCVE-2025-64778: CWE-798 Use of Hard-coded Credentials in Mirion Medical EC2 Software NMIS BioDose
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.