Server-side Request Forgery (SSRF) Affecting @lobehub/chat package, versions <1.19.13


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-LOBEHUBCHAT-8422872
  • published27 Nov 2024
  • disclosed26 Nov 2024
  • credityyzsec

Introduced: 26 Nov 2024

NewCVE-2024-32965  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade @lobehub/chat to version 1.19.13 or higher.

Overview

@lobehub/chat is a Lobe Chat - an open-source, high-performance chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. Supports one-click free deployment of your private ChatGPT/LLM web application.

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) through the X-Lobe-Chat-Auth header. An attacker can construct malicious requests to internal network services and leak sensitive information by manipulating the proxy address and OpenAI API Key within the JWT token without requiring user authentication.

References

CVSS Scores

version 4.0
version 3.1