Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xph5-278p-26qx

Опубликовано: 24 сент. 2025
Источник: github
Github: Прошло ревью
CVSS3: 4.3

Описание

lobe-chat has an Open Redirect

Description


Vulnerability Overview

The project's OIDC redirect handling logic constructs the host and protocol of the final redirect URL based on the X-Forwarded-Host or Host headers and the X-Forwarded-Proto value. In deployments where a reverse proxy forwards client-supplied X-Forwarded-* headers to the origin as-is, or where the origin trusts them without validation, an attacker can inject an arbitrary host and trigger an open redirect that sends users to a malicious domain.

Vulnerable Code Analysis

const internalRedirectUrlString = await oidcService.getInteractionResult(uid, result); log('OIDC Provider internal redirect URL string: %s', internalRedirectUrlString); let finalRedirectUrl; try { finalRedirectUrl = correctOIDCUrl(request, new URL(internalRedirectUrlString)); } catch { finalRedirectUrl = new URL(internalRedirectUrlString); log('Warning: Could not parse redirect URL, using as-is: %s', internalRedirectUrlString); } return NextResponse.redirect(finalRedirectUrl, { headers: request.headers, status: 303, });

https://github.com/lobehub/lobe-chat/blob/aa841a3879c30142720485182ad62aa0dbd74edc/src/app/(backend)/oidc/consent/route.ts#L113-L127

PoC


curl Example

curl -i 'http://localhost:3210/oidc/callback/desktop?code=abc&state=test123' \ -H 'X-Forwarded-Host: google.com' \ -H 'X-Forwarded-Proto: https'
image

Impact


  • It can force users to redirect to untrusted external domains, leading to subsequent attacks such as phishing, credential harvesting, and session fixation.
  • It can disrupt the OAuth/OIDC flow user experience by redirecting users to malicious domains disguised as legitimate pages (even though this path doesn't directly include tokens, it can be exploited for social engineering attacks through redirect chains).
  • The impact can be amplified when redirect chains are combined with other vulnerabilities such as CSP bypass or cache poisoning.

Пакеты

Наименование

@lobehub/chat

npm
Затронутые версииВерсия исправления

< 1.130.1

1.130.1

EPSS

Процентиль: 26%
0.0009
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-601

Связанные уязвимости

CVSS3: 4.3
nvd
4 месяца назад

Lobe Chat is an open-source artificial intelligence chat framework. Prior to version 1.130.1, the project's OIDC redirect handling logic constructs the host and protocol of the final redirect URL based on the X-Forwarded-Host or Host headers and the X-Forwarded-Proto value. In deployments where a reverse proxy forwards client-supplied X-Forwarded-* headers to the origin as-is, or where the origin trusts them without validation, an attacker can inject an arbitrary host and trigger an open redirect that sends users to a malicious domain. This issue has been patched in version 1.130.1.

EPSS

Процентиль: 26%
0.0009
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-601