A Server-Side Request Forgery (SSRF) vulnerability was discovered in chatwoot/chatwoot, affecting all versions prior to 2.5.0. The vulnerability allows an attacker to upload an SVG file containing a malicious SSRF payload. When the SVG file is used as an avatar and opened in a new tab, it can trigger the SSRF, potentially leading to host redirection.
Metrics
Affected Vendors & Products
References
History
Mon, 18 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Chatwoot
Chatwoot chatwoot |
|
CPEs | cpe:2.3:a:chatwoot:chatwoot:*:*:*:*:*:*:*:* | |
Vendors & Products |
Chatwoot
Chatwoot chatwoot |
|
Metrics |
cvssV3_1
|
Fri, 15 Nov 2024 11:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Server-Side Request Forgery (SSRF) vulnerability was discovered in chatwoot/chatwoot, affecting all versions prior to 2.5.0. The vulnerability allows an attacker to upload an SVG file containing a malicious SSRF payload. When the SVG file is used as an avatar and opened in a new tab, it can trigger the SSRF, potentially leading to host redirection. | |
Title | Server-Side Request Forgery (SSRF) in chatwoot/chatwoot | |
Weaknesses | CWE-918 | |
References |
| |
Metrics |
cvssV3_0
|
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-11-15T10:51:25.968Z
Updated: 2024-11-18T14:53:23.071Z
Reserved: 2021-08-26T20:27:26.728Z
Link: CVE-2021-3742
Vulnrichment
Updated: 2024-11-18T14:51:45.935Z
NVD
Status : Analyzed
Published: 2024-11-15T11:15:05.547
Modified: 2024-11-19T17:10:48.657
Link: CVE-2021-3742
Redhat
No data.