Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8984: CWE-770 Allocation of Resources Without Limits or Throttling in berriai berriai/litellm

0
High
VulnerabilityCVE-2024-8984cvecve-2024-8984cwe-770
Published: Thu Mar 20 2025 (03/20/2025, 10:09:19 UTC)
Source: CVE Database V5
Vendor/Project: berriai
Product: berriai/litellm

Description

A Denial of Service (DoS) vulnerability exists in berriai/litellm version v1.44.5. This vulnerability can be exploited by appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request. The server continuously processes each character, leading to excessive resource consumption and rendering the service unavailable. The issue is unauthenticated and does not require any user interaction, impacting all users of the service.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:08:56 UTC

Technical Analysis

CVE-2024-8984 is a Denial of Service vulnerability affecting berriai/litellm version v1.44.5, caused by improper resource allocation controls during HTTP multipart request processing. Specifically, the vulnerability is triggered when an attacker appends extra characters, such as dashes (-), to the end of a multipart boundary in an HTTP request. The server's multipart parser continuously processes each appended character without limits or throttling, leading to excessive CPU and memory consumption. This results in resource exhaustion, causing the service to become unresponsive or crash, effectively denying service to legitimate users. The vulnerability does not require any authentication or user interaction, allowing unauthenticated remote attackers to exploit it easily. The issue is classified under CWE-770, which involves allocation of resources without proper limits, a common cause of DoS conditions. Although no public exploits have been reported yet, the vulnerability's characteristics make it a significant risk, especially for publicly accessible services using the affected library. The CVSS v3.0 score of 7.5 reflects its high impact on availability with low attack complexity and no required privileges or user interaction.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of services relying on berriai/litellm, particularly those exposing HTTP multipart processing functionalities. Organizations in sectors such as cloud services, web hosting, software development, and any enterprise integrating this library into their applications could face service disruptions. The unauthenticated and remote nature of the exploit increases the likelihood of opportunistic attacks, potentially leading to downtime, loss of customer trust, and operational disruptions. Critical infrastructure providers or public-facing services in Europe could be targeted to cause widespread service outages. Additionally, the resource exhaustion could lead to cascading failures in dependent systems or increased operational costs due to mitigation efforts and incident response. The lack of known patches or exploits in the wild suggests a window of opportunity for attackers before organizations implement fixes.

Mitigation Recommendations

European organizations should first identify all instances of berriai/litellm in their environments, especially version v1.44.5 or unspecified affected versions. Until an official patch is released, implement network-level protections such as rate limiting and deep packet inspection to detect and block malformed multipart HTTP requests with suspicious boundary characters. Deploy Web Application Firewalls (WAFs) configured to recognize and mitigate abnormal multipart boundary patterns. Monitor server resource usage closely to detect early signs of exploitation attempts. Consider isolating or sandboxing services that process multipart requests to limit the blast radius of potential DoS attacks. Engage with the vendor or open-source maintainers to obtain or contribute to patches addressing the vulnerability. Finally, update incident response plans to include detection and mitigation strategies for multipart boundary-based DoS attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-09-18T20:50:25.840Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b2e178f764e1f470e95

Added to database: 10/15/2025, 1:01:34 PM

Last enriched: 10/15/2025, 1:08:56 PM

Last updated: 12/3/2025, 3:04:02 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats