CVE-2023-49785

Scores

EPSS

0.911high91.1%
0%20%40%60%80%100%

Percentile: 91.1%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Description

NextChat, also known as ChatGPT-Next-Web, is a cross-platform chat user interface for use with ChatGPT. Versions 2.11.2 and prior are vulnerable to server-side request forgery and cross-site scripting. This vulnerability enables read access to internal HTTP endpoints but also write access using HTTP POST, PUT, and other methods. Attackers can also use this vulnerability to mask their source IP by forwarding malicious traffic intended for other Internet targets through these open proxies. As of time of publication, no patch is available, but other mitigation strategies are available. Users may avoid exposing the application to the public internet or, if exposing the application to the internet, ensure it is an isolated network with no access to any other internal resources.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-79

Related Vulnerabilities

Exploits

Exploit ID: CVE-2023-49785

Source: github-poc

URL: https://github.com/hyunnna/NextChat_SSRF_CVE-2023-49785

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: nextchat

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:nextchat:nextchat:*:*:*:*:*:*:*:*",      "versionEndIncluding": "2.11.2",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

End of list