Lobe Chat is an open-source, AI chat framework. Versions of lobe-chat prior to 1.19.13 have an unauthorized ssrf vulnerability. An attacker can construct malicious requests to cause SSRF without logging in, attack intranet services, and leak sensitive information. The jwt token header X-Lobe-Chat-Auth strored proxy address and OpenAI API Key, can be modified to scan an internal network in the target lobe-web environment. This issue has been addressed in release version 1.19.13 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 26 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Lobehub
Lobehub lobe Chat |
|
CPEs | cpe:2.3:a:lobehub:lobe_chat:*:*:*:*:*:*:*:* | |
Vendors & Products |
Lobehub
Lobehub lobe Chat |
|
Metrics |
ssvc
|
Tue, 26 Nov 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Lobe Chat is an open-source, AI chat framework. Versions of lobe-chat prior to 1.19.13 have an unauthorized ssrf vulnerability. An attacker can construct malicious requests to cause SSRF without logging in, attack intranet services, and leak sensitive information. The jwt token header X-Lobe-Chat-Auth strored proxy address and OpenAI API Key, can be modified to scan an internal network in the target lobe-web environment. This issue has been addressed in release version 1.19.13 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | |
Title | ssrf vulnerability in lobe-chat | |
Weaknesses | CWE-918 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-11-26T18:25:56.215Z
Updated: 2024-11-26T18:48:27.413Z
Reserved: 2024-04-22T15:14:59.165Z
Link: CVE-2024-32965
Vulnrichment
Updated: 2024-11-26T18:48:23.333Z
NVD
Status : Received
Published: 2024-11-26T19:15:23.343
Modified: 2024-11-26T19:15:23.343
Link: CVE-2024-32965
Redhat
No data.