NextChat is a cross-platform ChatGPT/Gemini UI. There is a Server-Side Request Forgery (SSRF) vulnerability due to a lack of validation of the `endpoint` GET parameter on the WebDav API endpoint. This SSRF can be used to perform arbitrary HTTPS request from the vulnerable instance (MKCOL, PUT and GET methods supported), or to target NextChat users and make them execute arbitrary JavaScript code in their browser. This vulnerability has been patched in version 2.12.4.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-06-28T18:11:02.964Z
Updated: 2024-08-02T04:12:25.158Z
Reserved: 2024-06-18T16:37:02.727Z
Link: CVE-2024-38514
Vulnrichment
Updated: 2024-08-02T04:12:25.158Z
NVD
Status : Awaiting Analysis
Published: 2024-06-28T19:15:06.530
Modified: 2024-07-01T12:37:24.220
Link: CVE-2024-38514
Redhat
No data.