LobeChat < 1.19.13 Server-Side Request Forgery

high Web App Scanning Plugin ID 114586

Synopsis

LobeChat < 1.19.13 Server-Side Request Forgery

Description

According to the self-reported version in its response header, the version of LobeChat hosted on the remote web server is prior to 1.19.13. It is, therefore, affected by multiples Server-Side Request Forgery :

- A Server-Side Request Forgery through proxy address

- A Server-Side Request Forgery through through a bypass of a previous fix

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to LobeChat version 1.19.13 or later.

See Also

https://github.com/lobehub/lobe-chat/security/advisories/GHSA-2xcc-vm3f-m8rw

https://github.com/lobehub/lobe-chat/security/advisories/GHSA-3fc8-2r3f-8wrg

Plugin Details

Severity: High

ID: 114586

Type: remote

Published: 2/3/2025

Updated: 2/3/2025

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-47066

CVSS v3

Risk Factor: High

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2024-47066

Vulnerability Information

CPE: cpe:2.3:a:lobehub:lobe_chat:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 9/21/2024

Reference Information

CVE: CVE-2024-32965, CVE-2024-47066