CVE-2024-5278
MEDIUMGaizhenbiao Chuanhuchatgpt < 20240919 - Unrestricted File Upload
Title source: ruleDescription
gaizhenbiao/chuanhuchatgpt is vulnerable to an unrestricted file upload vulnerability due to insufficient validation of uploaded file types in its `/upload` endpoint. Specifically, the `handle_file_upload` function does not sanitize or validate the file extension or content type of uploaded files, allowing attackers to upload files with arbitrary extensions, including HTML files containing XSS payloads and Python files. This vulnerability, present in the latest version as of 20240310, could lead to stored XSS attacks and potentially result in remote code execution (RCE) on the server hosting the application.
References (2)
Core 2
Core References
Exploit, Third Party Advisory
https://huntr.com/bounties/ea821d86-941b-40f3-a857-91f758848e05
Scores
CVSS v3
6.1
EPSS
0.0067
EPSS Percentile
71.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-434
Status
published
Products (1)
gaizhenbiao/chuanhuchatgpt
< 20240919
Published
Jun 06, 2024
Tracked Since
Feb 18, 2026