A Server-Side Request Forgery (SSRF) vulnerability exists in the POST /worker_generate_stream API endpoint of the Controller API Server in lm-sys/fastchat, as of commit e208d5677c6837d590b81cb03847c0b9de100765. This vulnerability allows attackers to exploit the victim controller API server's credentials to perform unauthorized web actions or access unauthorized web resources by combining it with the POST /register_worker endpoint.
Metrics
Affected Vendors & Products
References
History
Mon, 30 Dec 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 30 Dec 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Server-Side Request Forgery (SSRF) vulnerability exists in the POST /worker_generate_stream API endpoint of the Controller API Server in lm-sys/fastchat, as of commit e208d5677c6837d590b81cb03847c0b9de100765. This vulnerability allows attackers to exploit the victim controller API server's credentials to perform unauthorized web actions or access unauthorized web resources by combining it with the POST /register_worker endpoint. | |
Title | SSRF in POST /worker_generate_stream API endpoint in lm-sys/fastchat | |
Weaknesses | CWE-918 | |
References |
| |
Metrics |
cvssV3_0
|
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-12-30T11:47:46.995Z
Updated: 2024-12-30T14:13:58.433Z
Reserved: 2024-10-16T16:45:54.195Z
Link: CVE-2024-10044
Vulnrichment
Updated: 2024-12-30T14:13:51.959Z
NVD
Status : Received
Published: 2024-12-30T12:15:05.990
Modified: 2024-12-30T12:15:05.990
Link: CVE-2024-10044
Redhat
No data.