Lucene search

K
GaizhenbiaoChuanhuchatgpt

5 matches found

CVE
CVE
added 2024/10/29 1:15 p.m.47 views

CVE-2024-5982

A path traversal vulnerability exists in the latest version of gaizhenbiao/chuanhuchatgpt. The vulnerability arises from unsanitized input handling in multiple features, including user upload, directory creation, and template loading. Specifically, the load_chat_history function in modules/models/b...

9.8CVSS9.6AI score0.04251EPSS
CVE
CVE
added 2024/10/29 1:15 p.m.45 views

CVE-2024-7807

A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240628 allows for a Denial of Service (DOS) attack. When uploading a file, if an attacker appends a large number of characters to the end of a multipart boundary, the system will continuously process each character, rendering ChuanhuChatGPT in...

7.5CVSS7.5AI score0.00188EPSS
CVE
CVE
added 2024/10/29 1:15 p.m.39 views

CVE-2024-5823

A file overwrite vulnerability exists in gaizhenbiao/chuanhuchatgpt versions

9.1CVSS7.1AI score0.00225EPSS
CVE
CVE
added 2024/10/29 1:15 p.m.35 views

CVE-2024-7962

An arbitrary file read vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240628 due to insufficient validation when loading prompt template files. An attacker can read any file that matches specific criteria using an absolute path. The file must not have a .json extension and, except for...

7.5CVSS7.4AI score0.00134EPSS
CVE
CVE
added 2024/10/29 1:15 p.m.34 views

CVE-2024-8143

In the latest version (20240628) of gaizhenbiao/chuanhuchatgpt, an issue exists in the /file endpoint that allows authenticated users to access the chat history of other users. When a user logs in, a directory is created in the history folder with the user's name. By manipulating the /file endpoint...

6.5CVSS5.1AI score0.00089EPSS