Metrics
Affected Vendors & Products
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 14 Nov 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gaizhenbiao chuanhuchatgpt
|
|
| CPEs | cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gaizhenbiao chuanhuchatgpt
|
Tue, 29 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gaizhenbiao
Gaizhenbiao gaizhenbiao\/chuanhuchatgpt |
|
| CPEs | cpe:2.3:a:gaizhenbiao:gaizhenbiao\/chuanhuchatgpt:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gaizhenbiao
Gaizhenbiao gaizhenbiao\/chuanhuchatgpt |
|
| Metrics |
cvssV3_1
|
Tue, 29 Oct 2024 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal vulnerability exists in the latest version of gaizhenbiao/chuanhuchatgpt. The vulnerability arises from unsanitized input handling in multiple features, including user upload, directory creation, and template loading. Specifically, the load_chat_history function in modules/models/base_model.py allows arbitrary file uploads, potentially leading to remote code execution (RCE). The get_history_names function in utils.py permits arbitrary directory creation. Additionally, the load_template function in utils.py can be exploited to leak the first column of CSV files. These issues stem from improper sanitization of user inputs concatenated with directory paths using os.path.join. | |
| Title | Path Traversal in gaizhenbiao/chuanhuchatgpt | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-10-29T13:47:03.458Z
Reserved: 2024-06-13T18:09:56.490Z
Link: CVE-2024-5982
Updated: 2024-10-29T13:46:47.949Z
Status : Analyzed
Published: 2024-10-29T13:15:07.637
Modified: 2024-11-14T18:52:16.567
Link: CVE-2024-5982
No data.