Lobe Chat DC-2024-47066 (Critical) – Unauthorized SSRF Vulnerability

2024-11-26

Vulnerability :

Lobe Chat versions before 1.19.13 are vulnerable to an unauthorized Server-Side Request Forgery (SSRF) attack. This means an attacker can trick the Lobe Chat server into making requests to internal systems, potentially leaking sensitive information or even gaining unauthorized access.

Vulnerability Details:

The vulnerability exists due to improper handling of redirects within the Lobe Chat application. An attacker can exploit this by:

1. Accessing the Lobe Chat settings and selecting OpenAI as the Large Language Model (LLM).
2. Providing a malicious proxy address that resolves to an internal system (e.g., a domain pointing to a local IP address).
3. Modifying the JWT token stored in the X-Lobe-Chat-Auth header to include the attacker-controlled proxy address.

Impact:

This vulnerability can be exploited by attackers to:

Leak sensitive internal data from the Lobe Chat server or other internal systems accessible through the proxy.
Gain unauthorized access to internal systems if proper security measures are not in place.

Exploit Severity:

This vulnerability is rated as Critical (CVSS: 9.0) due to the potential for significant data breaches and unauthorized access.

Remediation:

Upgrade Lobe Chat to version 1.19.13 or later, which addresses this vulnerability.

What Undercode Says:

This vulnerability highlights the importance of keeping software up to date and implementing proper security measures to prevent SSRF attacks. Lobe Chat users should prioritize upgrading to the latest version to mitigate the risk of exploitation.

Platform: Lobe Chat
Version: Before 1.19.13
Vulnerability: Unauthorized SSRF
Severity: Critical (CVSS: 9.0)
Date: Not specified in the provided text.

References:

Reported By: Github.com
Undercode AI: https://ai.undercodetesting.com

Image Source:

OpenAI: https://openai.com
Undercode AI DI v2: https://ai.undercode.helpFeatured Image

Scroll to Top