We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-10707

Local File Inclusion in gaizhenbiao/chuanhuchatgpt



Description

gaizhenbiao/chuanhuchatgpt version git d4ec6a3 is affected by a local file inclusion vulnerability due to the use of the gradio component gr.JSON, which has a known issue (CVE-2024-4941). This vulnerability allows unauthenticated users to access arbitrary files on the server by uploading a specially crafted JSON file and exploiting the improper input validation in the handle_dataset_selection function.

Reserved 2024-11-01 | Published 2025-03-20 | Updated 2025-03-20 | Assigner @huntr_ai


MEDIUM: 6.5CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-20 Improper Input Validation

Product status

Any version
affected

References

huntr.com/bounties/98fdedea-6ad0-4157-b7d2-ae71c9786ee8

cve.org (CVE-2024-10707)

nvd.nist.gov (CVE-2024-10707)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-10707

Support options

Helpdesk Chat, Email, Knowledgebase