Metrics
Affected Vendors & Products
Tue, 15 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Thu, 14 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gaizhenbiao chuanhuchatgpt
|
|
CPEs | cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:*:*:*:*:*:*:*:* | |
Vendors & Products |
Gaizhenbiao chuanhuchatgpt
|
Tue, 29 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gaizhenbiao
Gaizhenbiao gaizhenbiao\/chuanhuchatgpt |
|
CPEs | cpe:2.3:a:gaizhenbiao:gaizhenbiao\/chuanhuchatgpt:*:*:*:*:*:*:*:* | |
Vendors & Products |
Gaizhenbiao
Gaizhenbiao gaizhenbiao\/chuanhuchatgpt |
|
Metrics |
cvssV3_1
|
Tue, 29 Oct 2024 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A path traversal vulnerability exists in the latest version of gaizhenbiao/chuanhuchatgpt. The vulnerability arises from unsanitized input handling in multiple features, including user upload, directory creation, and template loading. Specifically, the load_chat_history function in modules/models/base_model.py allows arbitrary file uploads, potentially leading to remote code execution (RCE). The get_history_names function in utils.py permits arbitrary directory creation. Additionally, the load_template function in utils.py can be exploited to leak the first column of CSV files. These issues stem from improper sanitization of user inputs concatenated with directory paths using os.path.join. | |
Title | Path Traversal in gaizhenbiao/chuanhuchatgpt | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-10-29T13:47:03.458Z
Reserved: 2024-06-13T18:09:56.490Z
Link: CVE-2024-5982

Updated: 2024-10-29T13:46:47.949Z

Status : Analyzed
Published: 2024-10-29T13:15:07.637
Modified: 2024-11-14T18:52:16.567
Link: CVE-2024-5982

No data.