Attackers Can Trigger Server-Side Request Forgery with SVG Avatars in Chatwoot
CVE-2021-3742
8.8HIGH
Key Information:
- Vendor
- Chatwoot
- Status
- Chatwoot/chatwoot
- Vendor
- CVE Published:
- 15 November 2024
Summary
A Server-Side Request Forgery (SSRF) vulnerability has been identified within the Chatwoot application, impacting all versions prior to 2.5.0. The flaw allows attackers to upload malicious SVG files containing SSRF payloads. When such an SVG is utilized as a user avatar and subsequently opened in a new tab, the SSRF can be activated, which may lead to unauthorized redirection to internal or external hosts. This vulnerability poses significant risks to web application security and requires prompt attention to prevent exploitation.
Affected Version(s)
chatwoot/chatwoot < 2.5.0
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved