CVE-2024-32965

8.1 HIGH

📋 TL;DR

Lobe Chat versions before 1.19.13 have an unauthenticated SSRF vulnerability that allows attackers to send malicious requests to internal network services. This can lead to scanning of internal networks and potential leakage of sensitive information. All users running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Lobe Chat
Versions: All versions prior to 1.19.13
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with default configurations are vulnerable. The vulnerability requires network access to the Lobe Chat instance.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of internal network services, data exfiltration, and lateral movement within the target environment

🟠

Likely Case

Internal network scanning, service enumeration, and potential credential/sensitive information leakage

🟢

If Mitigated

Limited to external network scanning only if proper network segmentation and egress filtering are in place

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires modifying JWT token headers to inject malicious proxy addresses and API keys for SSRF attacks

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.19.13

Vendor Advisory: https://github.com/lobehub/lobe-chat/security/advisories/GHSA-2xcc-vm3f-m8rw

Restart Required: Yes

Instructions:

1. Stop the Lobe Chat service. 2. Update to version 1.19.13 or later using your package manager or by downloading from GitHub. 3. Restart the Lobe Chat service. 4. Verify the update was successful.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Lobe Chat from internal services
  • Deploy web application firewall (WAF) rules to block SSRF patterns and JWT header manipulation

🔍 How to Verify

Check if Vulnerable:

Check if running Lobe Chat version earlier than 1.19.13. Review application logs for unusual proxy requests or internal network scanning attempts.

Check Version:

Check package.json or application configuration for version number, or run: npm list lobe-chat (if installed via npm)

Verify Fix Applied:

Confirm version is 1.19.13 or later. Test that modifying X-Lobe-Chat-Auth header no longer allows SSRF requests to internal addresses.

📡 Detection & Monitoring

Log Indicators:

  • Unusual proxy requests to internal IP addresses
  • Failed authentication attempts with modified JWT headers
  • Requests to non-standard ports or internal services

Network Indicators:

  • Outbound connections from Lobe Chat to internal network segments
  • Unusual traffic patterns to internal services

SIEM Query:

source="lobe-chat" AND (url="*://10.*" OR url="*://192.168.*" OR url="*://172.16.*" OR url="*://127.*" OR url="*://localhost*")

🔗 References

📤 Share & Export