Impact
Chartbrew allows authenticated users to create API data connections by entering arbitrary URLs. Because the server fetches those URLs without validating the IP address, users can direct the application to internal or cloud metadata services. This server‐side request forgery can expose sensitive data, such as internal network hosts or cloud credentials, and can be leveraged for further attacks. The vulnerability is classified as CWE‑918.
Affected Systems
The vulnerability exists in Chartbrew versions prior to 4.8.5. Any deployment of the open‑source Chartbrew product before that release is potentially impacted.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity. The EPSS score is below 1%, suggesting low exploitation probability in the wild. The vulnerability is not listed in CISA's KEV catalog. Attackers need valid authentication to the Chartbrew instance and must have network connectivity to the targeted internal or cloud endpoint. Once the SSRF is triggered, the attacker can read responses from those endpoints, gaining confidentiality and potentially availability impact if repeated requests overload internal services.
OpenCVE Enrichment