<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>JoeCastrom — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/joecastrom/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/joecastrom/feed.xml" rel="self" type="application/rss+xml"/><item><title>JoeCastrom mcp-chat-studio Server-Side Request Forgery Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-mcp-chat-studio-ssrf/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mcp-chat-studio-ssrf/</guid><description>A server-side request forgery vulnerability exists in JoeCastrom mcp-chat-studio up to version 1.5.0 in the LLM Models API component, allowing remote attackers to manipulate the req.query.base_url argument and potentially conduct further attacks.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability has been identified in JoeCastrom&rsquo;s mcp-chat-studio, affecting versions up to 1.5.0. The vulnerability resides within the LLM Models API, specifically in the <code>server/routes/llm.js</code> file. An attacker can remotely exploit this flaw by manipulating the <code>req.query.base_url</code> argument. This allows the attacker to make arbitrary HTTP requests from the server, potentially leading to information disclosure, internal service access, or other malicious activities. The vulnerability is publicly known and actively discussed, increasing the risk of exploitation. The vendor was notified but has not yet responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an mcp-chat-studio instance running a vulnerable version (&lt;= 1.5.0).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/routes/llm.js</code> endpoint.</li>
<li>Within the request, the attacker manipulates the <code>req.query.base_url</code> parameter to point to an attacker-controlled server or an internal resource.</li>
<li>The mcp-chat-studio server processes the request and, due to the SSRF vulnerability, makes an HTTP request to the URL specified in the <code>req.query.base_url</code> parameter.</li>
<li>If the attacker controls the <code>base_url</code>, they can intercept the request and potentially steal sensitive information.</li>
<li>If the <code>base_url</code> points to an internal resource, the attacker may gain unauthorized access to internal services or data.</li>
<li>The attacker analyzes the response from the manipulated request to gather information about the internal network or services.</li>
<li>The attacker leverages the gained information to further compromise the mcp-chat-studio instance or the internal network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability can allow an attacker to read sensitive data from internal services, potentially leading to credential theft or data exfiltration. It can also be used to pivot to other internal systems, causing a wider breach. The lack of vendor response increases the risk, as no patch or mitigation is currently available. The CVSS v3.1 base score is 7.3, indicating a high severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/routes/llm.js</code> containing suspicious URLs in the <code>req.query.base_url</code> parameter using the provided Sigma rule.</li>
<li>Implement network segmentation to limit the impact of potential SSRF attacks by restricting access from the mcp-chat-studio server to internal resources.</li>
<li>Since no patch is available, consider applying a web application firewall (WAF) rule to filter requests to <code>/routes/llm.js</code> that contain potentially malicious URLs in the <code>req.query.base_url</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-7147</category><category>ssrf</category><category>mcp-chat-studio</category></item></channel></rss>