Server-side Request Forgery (SSRF) Affecting @lobehub/chat package, versions <0.162.25


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.18% (37th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-LOBEHUBCHAT-7268382
  • published19 Jun 2024
  • disclosed17 Jun 2024
  • creditzhuozhiyongde

Introduced: 17 Jun 2024

CVE-2024-37895  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade @lobehub/chat to version 0.162.25 or higher.

Overview

@lobehub/chat is a Lobe Chat - an open-source, high-performance chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. Supports one-click free deployment of your private ChatGPT/LLM web application.

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the base URL configuration, which can expose the backend API key to an attacker-controlled domain as outbound traffic is not filtered on URL. The API key can subsequently be used for unauthorized access to the vulnerable server.

References

CVSS Base Scores

version 4.0
version 3.1