A Server-Side Request Forgery (SSRF) vulnerability was discovered in chatwoot/chatwoot, affecting all versions prior to 2.5.0. The vulnerability allows an attacker to upload an SVG file containing a malicious SSRF payload. When the SVG file is used as an avatar and opened in a new tab, it can trigger the SSRF, potentially leading to host redirection.
Metrics
Affected Vendors & Products
References
History
Mon, 18 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chatwoot
Chatwoot chatwoot |
|
| CPEs | cpe:2.3:a:chatwoot:chatwoot:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Chatwoot
Chatwoot chatwoot |
|
| Metrics |
cvssV3_1
|
Fri, 15 Nov 2024 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Server-Side Request Forgery (SSRF) vulnerability was discovered in chatwoot/chatwoot, affecting all versions prior to 2.5.0. The vulnerability allows an attacker to upload an SVG file containing a malicious SSRF payload. When the SVG file is used as an avatar and opened in a new tab, it can trigger the SSRF, potentially leading to host redirection. | |
| Title | Server-Side Request Forgery (SSRF) in chatwoot/chatwoot | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-11-15T10:51:25.968Z
Updated: 2024-11-18T14:53:23.071Z
Reserved: 2021-08-26T20:27:26.728Z
Link: CVE-2021-3742
Updated: 2024-11-18T14:51:45.935Z
Status : Analyzed
Published: 2024-11-15T11:15:05.547
Modified: 2024-11-19T17:10:48.657
Link: CVE-2021-3742
No data.