Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h6qm-w442-h848

Опубликовано: 30 дек. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 9.3

Описание

A Server-Side Request Forgery (SSRF) vulnerability exists in the POST /worker_generate_stream API endpoint of the Controller API Server in lm-sys/fastchat, as of commit e208d5677c6837d590b81cb03847c0b9de100765. This vulnerability allows attackers to exploit the victim controller API server's credentials to perform unauthorized web actions or access unauthorized web resources by combining it with the POST /register_worker endpoint.

A Server-Side Request Forgery (SSRF) vulnerability exists in the POST /worker_generate_stream API endpoint of the Controller API Server in lm-sys/fastchat, as of commit e208d5677c6837d590b81cb03847c0b9de100765. This vulnerability allows attackers to exploit the victim controller API server's credentials to perform unauthorized web actions or access unauthorized web resources by combining it with the POST /register_worker endpoint.

EPSS

Процентиль: 35%
0.00146
Низкий

9.3 Critical

CVSS3

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 9.3
nvd
около 1 года назад

A Server-Side Request Forgery (SSRF) vulnerability exists in the POST /worker_generate_stream API endpoint of the Controller API Server in lm-sys/fastchat, as of commit e208d5677c6837d590b81cb03847c0b9de100765. This vulnerability allows attackers to exploit the victim controller API server's credentials to perform unauthorized web actions or access unauthorized web resources by combining it with the POST /register_worker endpoint.

EPSS

Процентиль: 35%
0.00146
Низкий

9.3 Critical

CVSS3

Дефекты

CWE-918