Miggo Logo

CVE-2024-24566: @lobehub/chat vulnerable to unauthorized access to plugins

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.34643%
Published
1/31/2024
Updated
1/31/2024
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
@lobehub/chatnpm<= 0.122.30.122.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from missing access control in the plugin gateway route handler. The commit diff shows the original implementation directly exported createGatewayOnEdgeRuntime as the POST handler without any authentication checks. The patched version adds a checkAuth middleware that validates ACCESS_CODE before processing requests. The vulnerable function was the unauthenticated POST handler that allowed direct plugin access bypassing password protection.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### **s*ription: W**n t** *ppli**tion is p*sswor*-prot**t** (**ploy** wit* t** `****SS_*O**` option), it is possi*l* to ****ss plu*ins wit*out prop*r *ut*oriz*tion (wit*out p*sswor*). ### Proo*-o*-*on**pt: L*t’s suppos* t**t *ppli**tion **s ***n **pl

Reasoning

T** vuln*r**ility st*mm** *rom missin* ****ss *ontrol in t** plu*in **t*w*y rout* **n*l*r. T** *ommit *i** s*ows t** ori*in*l impl*m*nt*tion *ir**tly *xport** *r**t***t*w*yOn****Runtim* *s t** POST **n*l*r wit*out *ny *ut**nti**tion ****ks. T** p*t**