Gaizhenbiao

Chuanhuchatgpt

31 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.13%
  • Veröffentlicht 04.11.2024 23:15:04
  • Zuletzt bearbeitet 11.07.2025 13:58:03

gaizhenbiao/chuanhuchatgpt project, version <=20240802 is vulnerable to stored Cross-Site Scripting (XSS) in WebSocket session transmission. An attacker can inject malicious content into a WebSocket message. When a victim accesses this session, the m...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 29.10.2024 13:15:10
  • Zuletzt bearbeitet 31.10.2024 16:23:35

In the latest version (20240628) of gaizhenbiao/chuanhuchatgpt, an issue exists in the /file endpoint that allows authenticated users to access the chat history of other users. When a user logs in, a directory is created in the history folder with th...

Exploit
  • EPSS 0.3%
  • Veröffentlicht 29.10.2024 13:15:10
  • Zuletzt bearbeitet 01.11.2024 14:19:28

An arbitrary file read vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240628 due to insufficient validation when loading prompt template files. An attacker can read any file that matches specific criteria using an absolute path. The fil...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 29.10.2024 13:15:10
  • Zuletzt bearbeitet 09.01.2025 18:15:29

A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240628 allows for a Denial of Service (DOS) attack. When uploading a file, if an attacker appends a large number of characters to the end of a multipart boundary, the system will continuously pr...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 29.10.2024 13:15:07
  • Zuletzt bearbeitet 31.10.2024 18:05:00

A file overwrite vulnerability exists in gaizhenbiao/chuanhuchatgpt versions <= 20240410. This vulnerability allows an attacker to gain unauthorized access to overwrite critical configuration files within the system. Exploiting this vulnerability can...

Exploit
  • EPSS 8.69%
  • Veröffentlicht 29.10.2024 13:15:07
  • Zuletzt bearbeitet 14.11.2024 18:52:16

A path traversal vulnerability exists in the latest version of gaizhenbiao/chuanhuchatgpt. The vulnerability arises from unsanitized input handling in multiple features, including user upload, directory creation, and template loading. Specifically, t...

Exploit
  • EPSS 4.97%
  • Veröffentlicht 31.07.2024 01:15:09
  • Zuletzt bearbeitet 21.11.2024 09:49:17

A vulnerability in the JSON file handling of gaizhenbiao/chuanhuchatgpt version 20240410 allows any user to delete any JSON file on the server, including critical configuration files such as `config.json` and `ds_config_chatbot.json`. This issue aris...

Exploit
  • EPSS 0.23%
  • Veröffentlicht 11.07.2024 11:15:09
  • Zuletzt bearbeitet 21.11.2024 09:48:47

A Stored Cross-Site Scripting (XSS) vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240410. This vulnerability allows an attacker to inject malicious JavaScript code into the chat history file. When a victim uploads this file, the malici...

Exploit
  • EPSS 3.61%
  • Veröffentlicht 10.07.2024 23:15:14
  • Zuletzt bearbeitet 15.10.2025 13:15:48

A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240410 allows an attacker to create arbitrary folders at any location on the server, including the root directory (C: dir). This can lead to uncontrolled resource consumption, resulting in resou...

Exploit
  • EPSS 5.37%
  • Veröffentlicht 10.07.2024 23:15:14
  • Zuletzt bearbeitet 15.07.2025 13:20:25

A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240410 allows any user to restart the server at will by sending a specific request to the `/queue/join?` endpoint with `"fn_index":66`. This unrestricted server restart capability can severely d...