Unrestricted File Upload Vulnerability in gaizhenbiao/chuanhuchatgpt Could Lead to Stored XSS and RCE
CVE-2024-5278

6.1MEDIUM

Key Information:

Vendor
Gaizhenbiao
Status
Gaizhenbiao/chuanhuchatgpt
Vendor
CVE Published:
6 June 2024

Summary

gaizhenbiao/chuanhuchatgpt is vulnerable to an unrestricted file upload vulnerability due to insufficient validation of uploaded file types in its /upload endpoint. Specifically, the handle_file_upload function does not sanitize or validate the file extension or content type of uploaded files, allowing attackers to upload files with arbitrary extensions, including HTML files containing XSS payloads and Python files. This vulnerability, present in the latest version as of 20240310, could lead to stored XSS attacks and potentially result in remote code execution (RCE) on the server hosting the application.

Affected Version(s)

gaizhenbiao/chuanhuchatgpt <= unspecified

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database
.