A path traversal vulnerability exists in the latest version of gaizhenbiao/chuanhuchatgpt. The vulnerability arises from unsanitized input handling in multiple features, including user upload, directory creation, and template loading. Specifically, the load_chat_history function in modules/models/base_model.py allows arbitrary file uploads, potentially leading to remote code execution (RCE). The get_history_names function in utils.py permits arbitrary directory creation. Additionally, the load_template function in utils.py can be exploited to leak the first column of CSV files. These issues stem from improper sanitization of user inputs concatenated with directory paths using os.path.join.
History

Thu, 14 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Gaizhenbiao chuanhuchatgpt
CPEs cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:*:*:*:*:*:*:*:*
Vendors & Products Gaizhenbiao chuanhuchatgpt

Tue, 29 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Gaizhenbiao
Gaizhenbiao gaizhenbiao\/chuanhuchatgpt
CPEs cpe:2.3:a:gaizhenbiao:gaizhenbiao\/chuanhuchatgpt:*:*:*:*:*:*:*:*
Vendors & Products Gaizhenbiao
Gaizhenbiao gaizhenbiao\/chuanhuchatgpt
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 29 Oct 2024 13:00:00 +0000

Type Values Removed Values Added
Description A path traversal vulnerability exists in the latest version of gaizhenbiao/chuanhuchatgpt. The vulnerability arises from unsanitized input handling in multiple features, including user upload, directory creation, and template loading. Specifically, the load_chat_history function in modules/models/base_model.py allows arbitrary file uploads, potentially leading to remote code execution (RCE). The get_history_names function in utils.py permits arbitrary directory creation. Additionally, the load_template function in utils.py can be exploited to leak the first column of CSV files. These issues stem from improper sanitization of user inputs concatenated with directory paths using os.path.join.
Title Path Traversal in gaizhenbiao/chuanhuchatgpt
Weaknesses CWE-22
References
Metrics cvssV3_0

{'score': 9.1, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-10-29T12:46:24.726Z

Updated: 2024-10-29T13:47:03.458Z

Reserved: 2024-06-13T18:09:56.490Z

Link: CVE-2024-5982

cve-icon Vulnrichment

Updated: 2024-10-29T13:46:47.949Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-29T13:15:07.637

Modified: 2024-11-14T18:52:16.567

Link: CVE-2024-5982

cve-icon Redhat

No data.