gaizhenbiao/chuanhuchatgpt is vulnerable to improper access control, allowing unauthorized access to the `config.json` file. This vulnerability is present in both authenticated and unauthenticated versions of the application, enabling attackers to obtain sensitive information such as API keys (`openai_api_key`, `google_palm_api_key`, `xmchat_api_key`, etc.), configuration details, and user credentials. The issue stems from the application's handling of HTTP requests for the `config.json` file, which does not properly restrict access based on user authentication.
References
Configurations
No configuration.
History
21 Nov 2024, 09:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/gaizhenbiao/chuanhuchatgpt/commit/c5ae3b5ae6b47259e0ce8730e0a47e85121f4a7d - | |
References | () https://huntr.com/bounties/e4df74bf-b2ee-490f-a9c9-e5c8010b8b29 - | |
Summary |
|
10 Apr 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-10 17:15
Updated : 2024-11-21 09:09
NVD link : CVE-2024-2217
Mitre link : CVE-2024-2217
CVE.ORG link : CVE-2024-2217
JSON object : View
Products Affected
No product.
CWE
CWE-284
Improper Access Control