A Local File Inclusion (LFI) vulnerability exists in the gaizhenbiao/chuanhuchatgpt application, specifically within the functionality for uploading chat history. The vulnerability arises due to improper input validation when handling file paths during the chat history upload process. An attacker can exploit this vulnerability by intercepting requests and manipulating the 'name' parameter to specify arbitrary file paths. This allows the attacker to read sensitive files on the server, leading to information leakage, including API keys and private information. The issue affects version 20240310 of the application.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-05-16T09:03:46.604Z
Updated: 2024-08-01T20:40:46.483Z
Reserved: 2024-04-29T18:37:03.454Z
Link: CVE-2024-4321
Vulnrichment
Updated: 2024-08-01T20:40:46.483Z
NVD
Status : Awaiting Analysis
Published: 2024-05-16T09:15:16.327
Modified: 2024-11-21T09:42:37.287
Link: CVE-2024-4321
Redhat
No data.