Lobe Chat is an open-source artificial intelligence chat framework. Prior to version 1.19.13, server-side request forgery protection implemented in `src/app/api/proxy/route.ts` does not consider redirect and could be bypassed when attacker provides an external malicious URL which redirects to internal resources like a private network or loopback address. Version 1.19.13 contains an improved fix for the issue.
References
Link | Resource |
---|---|
https://github.com/lobehub/lobe-chat/blob/main/src/app/api/proxy/route.ts | Broken Link |
https://github.com/lobehub/lobe-chat/commit/e960a23b0c69a5762eb27d776d33dac443058faf | Patch |
https://github.com/lobehub/lobe-chat/security/advisories/GHSA-3fc8-2r3f-8wrg | Exploit Third Party Advisory |
https://github.com/lobehub/lobe-chat/security/advisories/GHSA-mxhq-xw3g-rphc | Not Applicable |
Configurations
History
No history.
Information
Published : 2024-09-23 16:15
Updated : 2024-09-30 18:03
NVD link : CVE-2024-47066
Mitre link : CVE-2024-47066
CVE.ORG link : CVE-2024-47066
JSON object : View
Products Affected
lobehub
- lobe_chat
CWE
CWE-918
Server-Side Request Forgery (SSRF)