CVE-2024-6090
- EPSS 0.21%
- Veröffentlicht 27.06.2024 19:15:19
- Zuletzt bearbeitet 15.10.2025 13:15:49
A path traversal vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240410, allowing any user to delete other users' chat histories. This vulnerability can also be exploited to delete any files ending in `.json` on the target system, leadin...
CVE-2024-6038
- EPSS 0.14%
- Veröffentlicht 27.06.2024 19:15:19
- Zuletzt bearbeitet 15.10.2025 13:15:48
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the latest version of gaizhenbiao/chuanhuchatgpt. The vulnerability is located in the filter_history function within the utils.py module. This function takes a user-provided keywo...
CVE-2024-5822
- EPSS 0.04%
- Veröffentlicht 27.06.2024 19:15:16
- Zuletzt bearbeitet 15.07.2025 15:34:23
A Server-Side Request Forgery (SSRF) vulnerability exists in the upload processing interface of gaizhenbiao/ChuanhuChatGPT versions <= ChuanhuChatGPT-20240410-git.zip. This vulnerability allows attackers to send crafted requests from the vulnerable s...
CVE-2024-5278
- EPSS 0.51%
- Veröffentlicht 06.06.2024 19:16:07
- Zuletzt bearbeitet 15.10.2025 13:15:46
gaizhenbiao/chuanhuchatgpt is vulnerable to an unrestricted file upload vulnerability due to insufficient validation of uploaded file types in its `/upload` endpoint. Specifically, the `handle_file_upload` function does not sanitize or validate the f...
CVE-2024-5124
- EPSS 46.13%
- Veröffentlicht 06.06.2024 19:16:03
- Zuletzt bearbeitet 21.11.2024 09:47:01
A timing attack vulnerability exists in the gaizhenbiao/chuanhuchatgpt repository, specifically within the password comparison logic. The vulnerability is present in version 20240310 of the software, where passwords are compared using the '=' operato...
CVE-2024-3404
- EPSS 0.06%
- Veröffentlicht 06.06.2024 19:16:01
- Zuletzt bearbeitet 15.10.2025 13:15:43
In gaizhenbiao/chuanhuchatgpt, specifically the version tagged as 20240121, there exists a vulnerability due to improper access control mechanisms. This flaw allows an authenticated attacker to bypass intended access restrictions and read the `histor...
CVE-2024-3402
- EPSS 0.2%
- Veröffentlicht 06.06.2024 19:16:01
- Zuletzt bearbeitet 21.11.2024 09:29:31
A stored Cross-Site Scripting (XSS) vulnerability existed in version (20240121) of gaizhenbiao/chuanhuchatgpt due to inadequate sanitization and validation of model output data. Despite user-input validation efforts, the application fails to properly...
CVE-2024-3234
- EPSS 67.57%
- Veröffentlicht 06.06.2024 19:16:01
- Zuletzt bearbeitet 21.11.2024 09:29:12
The gaizhenbiao/chuanhuchatgpt application is vulnerable to a path traversal attack due to its use of an outdated gradio component. The application is designed to restrict user access to resources within the `web_assets` folder. However, the outdated...
CVE-2024-4520
- EPSS 0.16%
- Veröffentlicht 04.06.2024 20:15:11
- Zuletzt bearbeitet 15.10.2025 13:15:45
An improper access control vulnerability exists in the gaizhenbiao/chuanhuchatgpt application, specifically in version 20240410. This vulnerability allows any user on the server to access the chat history of any other user without requiring any form ...
CVE-2024-4321
- EPSS 0.28%
- Veröffentlicht 16.05.2024 09:15:16
- Zuletzt bearbeitet 10.07.2025 16:21:16
A Local File Inclusion (LFI) vulnerability exists in the gaizhenbiao/chuanhuchatgpt application, specifically within the functionality for uploading chat history. The vulnerability arises due to improper input validation when handling file paths duri...