The gaizhenbiao/chuanhuchatgpt application is vulnerable to a path traversal attack due to its use of an outdated gradio component. The application is designed to restrict user access to resources within the `web_assets` folder. However, the outdated version of gradio it employs is susceptible to path traversal, as identified in CVE-2023-51449. This vulnerability allows unauthorized users to bypass the intended restrictions and access sensitive files, such as `config.json`, which contains API keys. The issue affects the latest version of chuanhuchatgpt prior to the fixed version released on 20240305.
References
Link | Resource |
---|---|
https://github.com/gaizhenbiao/chuanhuchatgpt/commit/6b8f7db347b390f6f8bd07ea2a4ef01a47382f00 | Patch |
https://huntr.com/bounties/277e3ff0-5878-4809-a4b9-73cdbb70dc9f | Exploit Issue Tracking Patch Third Party Advisory |
Configurations
History
24 Sep 2024, 14:09
Type | Values Removed | Values Added |
---|---|---|
First Time |
Gaizhenbiao
Gaizhenbiao chuanhuchatgpt |
|
CPE | cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:*:*:*:*:*:*:*:* | |
References | () https://github.com/gaizhenbiao/chuanhuchatgpt/commit/6b8f7db347b390f6f8bd07ea2a4ef01a47382f00 - Patch | |
References | () https://huntr.com/bounties/277e3ff0-5878-4809-a4b9-73cdbb70dc9f - Exploit, Issue Tracking, Patch, Third Party Advisory |
07 Jun 2024, 14:56
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 Jun 2024, 19:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-06 19:16
Updated : 2024-09-24 14:09
NVD link : CVE-2024-3234
Mitre link : CVE-2024-3234
CVE.ORG link : CVE-2024-3234
JSON object : View
Products Affected
gaizhenbiao
- chuanhuchatgpt
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')