Advisory

ChatGPT-Next-Web user interface vulnerable to critical SSRF flaw

Take action: If you are using ChatGPT-Next-Web application, isolate it from the internet and track the github repo for a patch. Then apply the patch ASAP.


Learn More

NextChat, also known as ChatGPT-Next-Web, is a cross-platform chat user interface for use with ChatGPT.  It's a very popular web application, boasting over 63,000 stars and 52,000 forks on GitHub.

The software has a full-read server-side request forgery (SSRF) vulnerability, tracked as CVE-2023-49785 (CVSS score 9.1). The SSRF vulnerability exists within the `/api/cors` endpoint of NextChat. This vulnerability enables read access to internal HTTP endpoints but also write access using HTTP POST, PUT, and other methods. Attackers can also use this vulnerability to mask their source IP by forwarding malicious traffic intended for other Internet targets through these open proxies.

This vulnerability is especially concerning for instances deployed in AWS environments, as it could allow attackers to retrieve AWS access keys from EC2 instances.

Versions 2.11.2 and prior of NextChat are vulnerable to the flaw. As of time of publication, no patch is available, but other mitigation strategies are available. Users may avoid exposing the application to the public internet or, if exposing the application to the internet, ensure it is an isolated network with no access to any other internal resources.

It is strongly recommended that organizations limit the exposure of NextChat to the internet.

ChatGPT-Next-Web user interface vulnerable to critical SSRF flaw