CVE-2024-27564

MEDIUM EXPLOITED NUCLEI

ChatGPT个人专用版 - Server Side Request Forgery

Title source: nuclei

Description

pictureproxy.php in the dirk1983 mm1.ltd source code f9f4bbc allows SSRF via the url parameter. NOTE: the references section has an archived copy of pictureproxy.php from its original GitHub location, but the repository name might later change because it is misleading.

Exploits (5)

nomisec WORKING POC 13 stars
by chsxthwik · poc
https://github.com/chsxthwik/CVE-2024-27564
nomisec WRITEUP
by chaudhrymuhammadtayab · poc
https://github.com/chaudhrymuhammadtayab/SSRF-Exploit-CVE-2024-27564
vulncheck_xdb WRITEUP
infoleak
https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel

Nuclei Templates (1)

ChatGPT个人专用版 - Server Side Request Forgery
HIGHVERIFIEDby DhiyaneshDK
FOFA: title="ChatGPT个人专用版"

Scores

CVSS v3 5.8
EPSS 0.9208
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

Details

VulnCheck KEV 2024-04-27
CWE
CWE-918
Status published
Products (1)
dirk1983/chatgpt 2023-05-23
Published Mar 05, 2024
Tracked Since Feb 18, 2026