NextChat < 2.12.4 Server-Side Request Forgery

high Web App Scanning Plugin ID 114326

Synopsis

NextChat < 2.12.4 Server-Side Request Forgery

Description

NextChat (formerly ChatGPT-Next-Web) versions prior to 2.12.4 are vulnerable to Server-Side Request Forgery (SSRF) and Cross-Site Scripting attacks, allowing remote and unauthenticated attacker to make the vulnerable instance issue arbitrary requests on both external or internal assets through the '/api/webdav' endpoint or to execute JavaScript in the application users browsers context. This detection is included in the AI and LLM category.

Solution

Update to NextChat 2.12.4 or latest.

See Also

https://github.com/ChatGPTNextWeb/ChatGPT-Next-Web/releases/tag/v2.12.4

https://nextchat.dev/

Plugin Details

Severity: High

ID: 114326

Type: remote

Published: 6/24/2024

Updated: 6/24/2024

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS Score Source: CVE-2024-38514

CVSS v3

Risk Factor: High

Base Score: 7.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

CVSS Score Source: CVE-2024-38514

Vulnerability Information

CPE: cpe:2.3:a:nextchat:nextchat:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/24/2024

Vulnerability Publication Date: 6/24/2024

Reference Information

CVE: CVE-2024-38514