A Server-Side Request Forgery (SSRF) vulnerability exists in the POST /worker_generate_stream API endpoint of the Controller API Server in lm-sys/fastchat, as of commit e208d5677c6837d590b81cb03847c0b9de100765. This vulnerability allows attackers to exploit the victim controller API server's credentials to perform unauthorized web actions or access unauthorized web resources by combining it with the POST /register_worker endpoint.
References
Link | Resource |
---|---|
https://huntr.com/bounties/44633540-377d-4ac4-b3a3-c2d0fa19d0e6 | Exploit Third Party Advisory |
Configurations
History
29 Jul 2025, 23:26
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://huntr.com/bounties/44633540-377d-4ac4-b3a3-c2d0fa19d0e6 - Exploit, Third Party Advisory | |
First Time |
Lm-sys
Lm-sys fastchat |
|
CPE | cpe:2.3:a:lm-sys:fastchat:2024-09-23:*:*:*:*:*:*:* |
30 Dec 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-30 12:15
Updated : 2025-07-29 23:26
NVD link : CVE-2024-10044
Mitre link : CVE-2024-10044
CVE.ORG link : CVE-2024-10044
JSON object : View
Products Affected
lm-sys
- fastchat
CWE
CWE-918
Server-Side Request Forgery (SSRF)