CVE-2024-3234
CRITICAL NUCLEIGaizhenbiao Chuanhuchatgpt < 20240305 - Path Traversal
Title source: ruleDescription
The gaizhenbiao/chuanhuchatgpt application is vulnerable to a path traversal attack due to its use of an outdated gradio component. The application is designed to restrict user access to resources within the `web_assets` folder. However, the outdated version of gradio it employs is susceptible to path traversal, as identified in CVE-2023-51449. This vulnerability allows unauthorized users to bypass the intended restrictions and access sensitive files, such as `config.json`, which contains API keys. The issue affects the latest version of chuanhuchatgpt prior to the fixed version released on 20240305.
Nuclei Templates (1)
Chuanhu Chat - Directory Traversal
CRITICALVERIFIEDby DhiyaneshDk
Scores
CVSS v3
9.8
EPSS
0.8599
EPSS Percentile
99.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-22
Status
published
Products (1)
gaizhenbiao/chuanhuchatgpt
< 20240305
Published
Jun 06, 2024
Tracked Since
Feb 18, 2026