NextChat < 2.12.4 Server-Side Request Forgery

critical Web App Scanning Plugin ID 114326

Synopsis

NextChat < 2.12.4 Server-Side Request Forgery

Description

NextChat (formerly ChatGPT-Next-Web) versions prior to 2.12.4 are vulnerable to Server-Side Request Forgery (SSRF) and Cross-Site Scripting attacks, allowing remote and unauthenticated attacker to make the vulnerable instance issue arbitrary requests on both external or internal assets through the '/api/webdav' endpoint or to execute JavaScript in the application users browsers context.

Solution

Update to NextChat 2.12.4 or latest.

See Also

https://github.com/ChatGPTNextWeb/ChatGPT-Next-Web/releases/tag/v2.12.4

https://nextchat.dev/

Plugin Details

Severity: Critical

ID: 114326

Type: remote

Published: 6/24/2024

Updated: 6/24/2024

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2024-38514

CVSS v3

Risk Factor: Critical

Base Score: 9.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

CVSS Score Source: CVE-2024-38514

Vulnerability Information

CPE: cpe:2.3:a:nextchat:nextchat:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/24/2024

Vulnerability Publication Date: 6/24/2024

Reference Information

CVE: CVE-2024-38514