GHSA-jhvf-7c85-3c9g

Suggest an improvement
Source
https://github.com/advisories/GHSA-jhvf-7c85-3c9g
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-jhvf-7c85-3c9g/GHSA-jhvf-7c85-3c9g.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-jhvf-7c85-3c9g
Aliases
Published
2024-04-01T21:30:46Z
Modified
2024-06-05T16:43:15.641403Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
LocalAI cross-site request forgery vulnerability
Details

A Cross-Site Request Forgery (CSRF) vulnerability exists in the mudler/localai application, allowing attackers to craft malicious webpages that, when visited by a victim, perform unauthorized actions on the victim's local LocalAI instance without their consent. This vulnerability enables attackers to exhaust system resources, consume credits, and fill disk space by making numerous resource-intensive API calls, such as generating images or uploading files. The vulnerability stems from the application's acceptance of simple request content-types without requiring CSRF tokens or implementing other CSRF mitigation measures. Successful exploitation does not require network access to the vulnerable LocalAI environment.

References

Affected packages

Go / github.com/go-skynet/LocalAI

Package

Name
github.com/go-skynet/LocalAI
View open source insights on deps.dev
Purl
pkg:golang/github.com/go-skynet/LocalAI

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
2.7.0