Unrestricted File Upload Vulnerability in gaizhenbiao/chuanhuchatgpt Could Lead to Stored XSS and RCE
CVE-2024-5278
6.1MEDIUM
Key Information
- Vendor
- Gaizhenbiao
- Status
- Gaizhenbiao/chuanhuchatgpt
- Vendor
- CVE Published:
- 6 June 2024
Summary
gaizhenbiao/chuanhuchatgpt is vulnerable to an unrestricted file upload vulnerability due to insufficient validation of uploaded file types in its `/upload` endpoint. Specifically, the `handle_file_upload` function does not sanitize or validate the file extension or content type of uploaded files, allowing attackers to upload files with arbitrary extensions, including HTML files containing XSS payloads and Python files. This vulnerability, present in the latest version as of 20240310, could lead to stored XSS attacks and potentially result in remote code execution (RCE) on the server hosting the application.
Affected Version(s)
gaizhenbiao/chuanhuchatgpt <= unspecified
CVSS V3.1
Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Risk change from: null to: 6.5 - (MEDIUM)
Vulnerability published.
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database