Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2024-32964Server-Side Request Forgery in Lobe-chat

Severity
9.0CRITICALNVD
EPSS
74.1%
top 1.15%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMay 14
Latest updateSep 23

Description

Lobe Chat is a chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. Prior to 0.150.6, lobe-chat had an unauthorized Server-Side Request Forgery vulnerability in the /api/proxy endpoint. An attacker can construct malicious requests to cause Server-Side Request Forgery without logging in, attack intranet services, and leak sensitive information.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:HExploitability: 2.3 | Impact: 6.0

Affected Packages3 packages

npmlobehub/chat< 0.150.6+1
CVEListV5lobehub/lobe-chat< 1.19.13
NVDlobehub/lobe_chat< 0.150.6

Patches

🔴Vulnerability Details

4
GHSA
lobe-chat implemented an insufficient fix for GHSA-mxhq-xw3g-rphc (CVE-2024-32964)2024-09-23
OSV
lobe-chat implemented an insufficient fix for GHSA-mxhq-xw3g-rphc (CVE-2024-32964)2024-09-23
GHSA
lobe-chat `/api/proxy` endpoint Server-Side Request Forgery vulnerability2024-05-10
OSV
lobe-chat `/api/proxy` endpoint Server-Side Request Forgery vulnerability2024-05-10

💥Exploits & PoCs

1
Nuclei
Lobe Chat <= v0.150.5 - Server-Side Request Forgery