CVE-2024-47066
Lobe Chat has insufficient fix for GHSA-mxhq-xw3g-rphc (CVE-2024-32964)
Severity Score
9.0
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track*
*SSVC
Descriptions
Lobe Chat is an open-source artificial intelligence chat framework. Prior to version 1.19.13, server-side request forgery protection implemented in `src/app/api/proxy/route.ts` does not consider redirect and could be bypassed when attacker provides an external malicious URL which redirects to internal resources like a private network or loopback address. Version 1.19.13 contains an improved fix for the issue.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track*
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-09-17 CVE Reserved
- 2024-09-23 CVE Published
- 2024-09-23 CVE Updated
- 2024-09-24 First Exploit
- 2024-10-01 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-918: Server-Side Request Forgery (SSRF)
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://github.com/lobehub/lobe-chat/blob/main/src/app/api/proxy/route.ts | X_refsource_misc | |
https://github.com/lobehub/lobe-chat/commit/e960a23b0c69a5762eb27d776d33dac443058faf | X_refsource_misc | |
https://github.com/lobehub/lobe-chat/security/advisories/GHSA-3fc8-2r3f-8wrg | X_refsource_confirm | |
https://github.com/lobehub/lobe-chat/security/advisories/GHSA-mxhq-xw3g-rphc | X_refsource_misc |
URL | Date | SRC |
---|---|---|
https://github.com/l8BL/CVE-2024-47066 | 2024-09-24 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|