A Server-Side Request Forgery (SSRF) vulnerability exists in the stangirard/quivr application, version 0.0.204, which allows attackers to access internal networks. The vulnerability is present in the crawl endpoint where the 'url' parameter can be manipulated to send HTTP requests to arbitrary URLs, thereby facilitating SSRF attacks. The affected code is located in the backend/routes/crawl_routes.py file, specifically within the crawl_endpoint function. This issue could allow attackers to interact with internal services that are accessible from the server hosting the application.
References
Link | Resource |
---|---|
https://huntr.com/bounties/b6011986-954a-47da-a60c-fc7aebc8005d | Exploit Third Party Advisory |
Configurations
History
17 Oct 2024, 18:45
Type | Values Removed | Values Added |
---|---|---|
First Time |
Quivr
Quivr quivr |
|
References | () https://huntr.com/bounties/b6011986-954a-47da-a60c-fc7aebc8005d - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:quivr:quivr:0.0.204:*:*:*:*:*:*:* |
07 Jun 2024, 14:56
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 Jun 2024, 19:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-06 19:16
Updated : 2024-10-17 18:45
NVD link : CVE-2024-4851
Mitre link : CVE-2024-4851
CVE.ORG link : CVE-2024-4851
JSON object : View
Products Affected
quivr
- quivr
CWE
CWE-918
Server-Side Request Forgery (SSRF)