<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>HyperChat — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/hyperchat/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 23 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/hyperchat/feed.xml" rel="self" type="application/rss+xml"/><item><title>BigSweetPotatoStudio HyperChat AI Proxy Middleware Server-Side Request Forgery</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-hyperchat-ssrf/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-hyperchat-ssrf/</guid><description>A server-side request forgery (SSRF) vulnerability exists in BigSweetPotatoStudio HyperChat up to version 2.0.0-alpha.63, allowing a remote attacker to manipulate the 'baseurl' argument in the 'fetch' function of the AI Proxy Middleware component to make arbitrary HTTP requests.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability, identified as CVE-2026-7223, affects BigSweetPotatoStudio HyperChat up to version 2.0.0-alpha.63. The vulnerability resides in the &lsquo;fetch&rsquo; function within the AI Proxy Middleware located at <code>packages/core/src/http/aiProxyMiddleware.mts</code>. By manipulating the <code>baseurl</code> argument, a remote attacker can force the server to make arbitrary HTTP requests to internal or external resources. This issue allows attackers to potentially access sensitive information, bypass security controls, or perform other malicious actions. The vulnerability is remotely exploitable, and a public exploit is available, increasing the risk of widespread exploitation. The project maintainers were notified but have not responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an instance of BigSweetPotatoStudio HyperChat running version 2.0.0-alpha.63 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the AI Proxy Middleware component.</li>
<li>The crafted request includes a manipulated <code>baseurl</code> argument within the request to the <code>fetch</code> function, pointing to an internal resource (e.g., <code>http://localhost:8080/admin</code>) or an external server controlled by the attacker.</li>
<li>The HyperChat server, without proper validation of the <code>baseurl</code>, uses it to make an HTTP request.</li>
<li>If the <code>baseurl</code> points to an internal resource, the server retrieves the content of that resource and sends it back to the attacker.</li>
<li>If the <code>baseurl</code> points to an external server, the server makes a request to the attacker&rsquo;s server, potentially leaking sensitive information in the request headers or body.</li>
<li>The attacker analyzes the response from the server to gather sensitive information or identify further attack vectors.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-7223) can allow an attacker to read sensitive internal data, such as configuration files or API keys, potentially leading to full system compromise. The attacker could also use the vulnerable server as a proxy to scan internal networks or attack other internal systems. Due to the public availability of the exploit, organizations using vulnerable versions of HyperChat are at increased risk of being targeted. The CVSS v3.1 base score for this vulnerability is 7.3, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization to the <code>baseurl</code> argument in the AI Proxy Middleware to prevent manipulation, addressing CVE-2026-7223.</li>
<li>Implement network segmentation to restrict access from the HyperChat server to only necessary internal resources.</li>
<li>Deploy the Sigma rule &ldquo;HyperChat SSRF Attempt&rdquo; to detect attempts to exploit the vulnerability via HTTP request patterns.</li>
<li>Monitor web server logs for suspicious outbound connections originating from the HyperChat server, correlating with user input.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>vulnerability</category><category>webserver</category></item></channel></rss>