The gaizhenbiao/chuanhuchatgpt application is vulnerable to a path traversal attack due to its use of an outdated gradio component. The application is designed to restrict user access to resources within the `web_assets` folder. However, the outdated version of gradio it employs is susceptible to path traversal, as identified in CVE-2023-51449. This vulnerability allows unauthorized users to bypass the intended restrictions and access sensitive files, such as `config.json`, which contains API keys. The issue affects the latest version of chuanhuchatgpt prior to the fixed version released on 20240305.
History

Tue, 24 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Gaizhenbiao
Gaizhenbiao chuanhuchatgpt
CPEs cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:*:*:*:*:*:*:*:*
Vendors & Products Gaizhenbiao
Gaizhenbiao chuanhuchatgpt
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-06-06T18:20:45.616Z

Updated: 2024-08-01T20:05:08.277Z

Reserved: 2024-04-02T19:07:01.619Z

Link: CVE-2024-3234

cve-icon Vulnrichment

Updated: 2024-08-01T20:05:08.277Z

cve-icon NVD

Status : Modified

Published: 2024-06-06T19:16:01.040

Modified: 2024-11-21T09:29:12.493

Link: CVE-2024-3234

cve-icon Redhat

No data.