Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-27018 | A Server-Side Request Forgery (SSRF) vulnerability was discovered in chatwoot/chatwoot, affecting all versions prior to 2.5.0. The vulnerability allows an attacker to upload an SVG file containing a malicious SSRF payload. When the SVG file is used as an avatar and opened in a new tab, it can trigger the SSRF, potentially leading to host redirection. |
Mon, 18 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chatwoot
Chatwoot chatwoot |
|
| CPEs | cpe:2.3:a:chatwoot:chatwoot:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Chatwoot
Chatwoot chatwoot |
|
| Metrics |
cvssV3_1
|
Fri, 15 Nov 2024 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Server-Side Request Forgery (SSRF) vulnerability was discovered in chatwoot/chatwoot, affecting all versions prior to 2.5.0. The vulnerability allows an attacker to upload an SVG file containing a malicious SSRF payload. When the SVG file is used as an avatar and opened in a new tab, it can trigger the SSRF, potentially leading to host redirection. | |
| Title | Server-Side Request Forgery (SSRF) in chatwoot/chatwoot | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-11-18T14:53:23.071Z
Reserved: 2021-08-26T20:27:26.728Z
Link: CVE-2021-3742
Updated: 2024-11-18T14:51:45.935Z
Status : Analyzed
Published: 2024-11-15T11:15:05.547
Modified: 2024-11-19T17:10:48.657
Link: CVE-2021-3742
No data.
OpenCVE Enrichment
No data.
EUVD