SSRF Vulnerability in Quivr Allowing Access to Internal Networks
CVE-2024-4851
7.7HIGH
Key Information:
- Vendor
- Stangirard
- Status
- Stangirard/quivr
- Vendor
- CVE Published:
- 6 June 2024
Summary
The vulnerability in the Stangirard Quivr application arises from the inadequate validation of the 'url' parameter within the crawl endpoint. This flaw allows an attacker to manipulate this parameter to make HTTP requests to arbitrary URLs. Such SSRF attacks can lead to unauthorized interactions with internal services that are otherwise restricted, exposing sensitive data and resources to exploitation. The affected code is located in the backend/routes/crawl_routes.py file, specifically in the crawl_endpoint function. Proper validation of input parameters is crucial for mitigating such risks.
Affected Version(s)
stangirard/quivr <= unspecified
References
CVSS V3.1
Score:
7.7
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database