CVE-2024-48059
- EPSS 0.13%
- Veröffentlicht 04.11.2024 23:15:04
- Zuletzt bearbeitet 11.07.2025 13:58:03
gaizhenbiao/chuanhuchatgpt project, version <=20240802 is vulnerable to stored Cross-Site Scripting (XSS) in WebSocket session transmission. An attacker can inject malicious content into a WebSocket message. When a victim accesses this session, the m...
CVE-2024-8143
- EPSS 0.14%
- Veröffentlicht 29.10.2024 13:15:10
- Zuletzt bearbeitet 31.10.2024 16:23:35
In the latest version (20240628) of gaizhenbiao/chuanhuchatgpt, an issue exists in the /file endpoint that allows authenticated users to access the chat history of other users. When a user logs in, a directory is created in the history folder with th...
CVE-2024-7962
- EPSS 0.3%
- Veröffentlicht 29.10.2024 13:15:10
- Zuletzt bearbeitet 01.11.2024 14:19:28
An arbitrary file read vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240628 due to insufficient validation when loading prompt template files. An attacker can read any file that matches specific criteria using an absolute path. The fil...
CVE-2024-7807
- EPSS 0.15%
- Veröffentlicht 29.10.2024 13:15:10
- Zuletzt bearbeitet 09.01.2025 18:15:29
A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240628 allows for a Denial of Service (DOS) attack. When uploading a file, if an attacker appends a large number of characters to the end of a multipart boundary, the system will continuously pr...
CVE-2024-5823
- EPSS 0.1%
- Veröffentlicht 29.10.2024 13:15:07
- Zuletzt bearbeitet 31.10.2024 18:05:00
A file overwrite vulnerability exists in gaizhenbiao/chuanhuchatgpt versions <= 20240410. This vulnerability allows an attacker to gain unauthorized access to overwrite critical configuration files within the system. Exploiting this vulnerability can...
CVE-2024-5982
- EPSS 8.69%
- Veröffentlicht 29.10.2024 13:15:07
- Zuletzt bearbeitet 14.11.2024 18:52:16
A path traversal vulnerability exists in the latest version of gaizhenbiao/chuanhuchatgpt. The vulnerability arises from unsanitized input handling in multiple features, including user upload, directory creation, and template loading. Specifically, t...
CVE-2024-6255
- EPSS 4.97%
- Veröffentlicht 31.07.2024 01:15:09
- Zuletzt bearbeitet 21.11.2024 09:49:17
A vulnerability in the JSON file handling of gaizhenbiao/chuanhuchatgpt version 20240410 allows any user to delete any JSON file on the server, including critical configuration files such as `config.json` and `ds_config_chatbot.json`. This issue aris...
CVE-2024-6035
- EPSS 0.23%
- Veröffentlicht 11.07.2024 11:15:09
- Zuletzt bearbeitet 21.11.2024 09:48:47
A Stored Cross-Site Scripting (XSS) vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240410. This vulnerability allows an attacker to inject malicious JavaScript code into the chat history file. When a victim uploads this file, the malici...
CVE-2024-6037
- EPSS 3.61%
- Veröffentlicht 10.07.2024 23:15:14
- Zuletzt bearbeitet 15.10.2025 13:15:48
A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240410 allows an attacker to create arbitrary folders at any location on the server, including the root directory (C: dir). This can lead to uncontrolled resource consumption, resulting in resou...
CVE-2024-6036
- EPSS 5.37%
- Veröffentlicht 10.07.2024 23:15:14
- Zuletzt bearbeitet 15.07.2025 13:20:25
A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240410 allows any user to restart the server at will by sending a specific request to the `/queue/join?` endpoint with `"fn_index":66`. This unrestricted server restart capability can severely d...