CVE-2024-27564
MEDIUM EXPLOITED NUCLEIChatGPT个人专用版 - Server Side Request Forgery
Title source: nucleiDescription
pictureproxy.php in the dirk1983 mm1.ltd source code f9f4bbc allows SSRF via the url parameter. NOTE: the references section has an archived copy of pictureproxy.php from its original GitHub location, but the repository name might later change because it is misleading.
Exploits (5)
nomisec
WRITEUP
by chaudhrymuhammadtayab · poc
https://github.com/chaudhrymuhammadtayab/SSRF-Exploit-CVE-2024-27564
Nuclei Templates (1)
ChatGPT个人专用版 - Server Side Request Forgery
HIGHVERIFIEDby DhiyaneshDK
FOFA:
title="ChatGPT个人专用版"
References (5)
Scores
CVSS v3
5.8
EPSS
0.9208
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
Details
VulnCheck KEV
2024-04-27
CWE
CWE-918
Status
published
Products (1)
dirk1983/chatgpt
2023-05-23
Published
Mar 05, 2024
Tracked Since
Feb 18, 2026