CVE-2024-4321
LowVulnerability Description
A Local File Inclusion (LFI) vulnerability exists in the gaizhenbiao/chuanhuchatgpt application, specifically within the functionality for uploading chat history. The vulnerability arises due to improper input validation when handling file paths during the chat history upload process. An attacker can exploit this vulnerability by intercepting requests and manipulating the 'name' parameter to specify arbitrary file paths. This allows the attacker to read sensitive files on the server, leading to information leakage, including API keys and private information. The issue affects version 20240310 of the application.
Known Affected Software
1 configuration(s) from 1 vendor(s)
cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:20240310:*:*:*:*:*:*:*
Severity Details
Weakness Type (CWE)
Improper Input Validation
- Description
- The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
- Exploit Likelihood
- High
- Typical Severity
- High
- Abstraction Level
- Class
Key Information
- Published Date
- May 16, 2024
External Resources
Related News Articles
Latest news and updates about CVE-2024-4321
