logo

CVE-2023-49785 nextchat

Package

Manager: npm
Name: nextchat
Vulnerable Version: >=0 <=2.11.2

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.93382 pctl0.9981

Details

NextChat has full-read SSRF and XSS vulnerability in /api/cors endpoint NextChat, also known as ChatGPT-Next-Web, is a cross-platform chat user interface for use with ChatGPT. Versions 2.11.2 and prior are vulnerable to server-side request forgery and cross-site scripting. This vulnerability enables read access to internal HTTP endpoints but also write access using HTTP POST, PUT, and other methods. Attackers can also use this vulnerability to mask their source IP by forwarding malicious traffic intended for other Internet targets through these open proxies. As of time of publication, no patch is available, but other mitigation strategies are available. Users may avoid exposing the application to the public internet or, if exposing the application to the internet, ensure it is an isolated network with no access to any other internal resources.

Metadata

Created: 2024-08-05T21:29:23Z
Modified: 2024-08-05T21:29:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/08/GHSA-qf3q-9f3h-cjp9/GHSA-qf3q-9f3h-cjp9.json
CWE IDs: ["CWE-79", "CWE-918"]
Alternative ID: GHSA-qf3q-9f3h-cjp9
Finding: F100
Auto approve: 1