Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p36r-qxgx-jq2v

Опубликовано: 17 июн. 2024
Источник: github
Github: Прошло ревью
CVSS3: 5.7

Описание

Lobe Chat API Key Leak

Summary

If an attacker can successfully authenticate through SSO/Access Code, they can obtain the real backend API Key by modifying the base URL to their own attack URL on the frontend and setting up a server-side request.

Details

The attack process is described above.

image

PoC

Frontend:

  1. Pass basic authentication (SSO/Access Code).
  2. Set the Base URL to a private attack address.
  3. Configure the request method to be a server-side request.
  4. At the self-set attack address, retrieve the API Key information from the request headers.

Backend:

  1. The LobeChat version allows setting the Base URL.
  2. There is no outbound traffic whitelist.

Impact

All community version LobeChat users using SSO/Access Code authentication, tested on version 0.162.13.

Пакеты

Наименование

@lobehub/chat

npm
Затронутые версииВерсия исправления

< 0.162.25

0.162.25

EPSS

Процентиль: 73%
0.00786
Низкий

5.7 Medium

CVSS3

Дефекты

CWE-200
CWE-918

Связанные уязвимости

CVSS3: 5.7
nvd
больше 1 года назад

Lobe Chat is an open-source LLMs/AI chat framework. In affected versions if an attacker can successfully authenticate through SSO/Access Code, they can obtain the real backend API Key by modifying the base URL to their own attack URL on the frontend and setting up a server-side request. This issue has been addressed in version 0.162.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS

Процентиль: 73%
0.00786
Низкий

5.7 Medium

CVSS3

Дефекты

CWE-200
CWE-918