Home

Description

The gaizhenbiao/chuanhuchatgpt application is vulnerable to a path traversal attack due to its use of an outdated gradio component. The application is designed to restrict user access to resources within the `web_assets` folder. However, the outdated version of gradio it employs is susceptible to path traversal, as identified in CVE-2023-51449. This vulnerability allows unauthorized users to bypass the intended restrictions and access sensitive files, such as `config.json`, which contains API keys. The issue affects the latest version of chuanhuchatgpt prior to the fixed version released on 20240305.

PUBLISHED Reserved 2024-04-02 | Published 2024-06-06 | Updated 2024-08-01 | Assigner @huntr_ai




CRITICAL: 9.8CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Any version before 20240305
affected

References

huntr.com/bounties/277e3ff0-5878-4809-a4b9-73cdbb70dc9f

github.com/...ommit/6b8f7db347b390f6f8bd07ea2a4ef01a47382f00

cve.org (CVE-2024-3234)

nvd.nist.gov (CVE-2024-3234)

Download JSON