An arbitrary file read vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240628 due to insufficient validation when loading prompt template files. An attacker can read any file that matches specific criteria using an absolute path. The file must not have a .json extension and, except for the first line, every other line must contain commas. This vulnerability allows reading parts of format-compliant files, including code and log files, which may contain highly sensitive information such as account credentials.
History

Fri, 01 Nov 2024 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:2023-06-28:*:*:*:*:*:*:* cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:20240628:*:*:*:*:*:*:*

Thu, 31 Oct 2024 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Gaizhenbiao chuanhuchatgpt
Weaknesses CWE-22
CPEs cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:2023-06-28:*:*:*:*:*:*:*
Vendors & Products Gaizhenbiao chuanhuchatgpt
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Tue, 29 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Gaizhenbiao
Gaizhenbiao gaizhenbiao\/chuanhuchatgpt
CPEs cpe:2.3:a:gaizhenbiao:gaizhenbiao\/chuanhuchatgpt:*:*:*:*:*:*:*:*
Vendors & Products Gaizhenbiao
Gaizhenbiao gaizhenbiao\/chuanhuchatgpt
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 29 Oct 2024 13:00:00 +0000

Type Values Removed Values Added
Description An arbitrary file read vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240628 due to insufficient validation when loading prompt template files. An attacker can read any file that matches specific criteria using an absolute path. The file must not have a .json extension and, except for the first line, every other line must contain commas. This vulnerability allows reading parts of format-compliant files, including code and log files, which may contain highly sensitive information such as account credentials.
Title Arbitrary File Read via Insufficient Validation in gaizhenbiao/chuanhuchatgpt
Weaknesses CWE-29
References
Metrics cvssV3_0

{'score': 7.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2024-10-29T12:47:58.697Z

Updated: 2024-10-29T13:38:20.986Z

Reserved: 2024-08-19T19:03:41.087Z

Link: CVE-2024-7962

cve-icon Vulnrichment

Updated: 2024-10-29T13:38:13.219Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-29T13:15:10.557

Modified: 2024-11-01T14:19:28.453

Link: CVE-2024-7962

cve-icon Redhat

No data.