Unrestricted File Upload Vulnerability in gaizhenbiao/chuanhuchatgpt Could Lead to Stored XSS and RCE

CVE-2024-5278
6.5MEDIUM

Key Information

Vendor
Gaizhenbiao
Status
Gaizhenbiao/chuanhuchatgpt
Vendor
CVE Published:
6 June 2024

Summary

gaizhenbiao/chuanhuchatgpt is vulnerable to an unrestricted file upload vulnerability due to insufficient validation of uploaded file types in its `/upload` endpoint. Specifically, the `handle_file_upload` function does not sanitize or validate the file extension or content type of uploaded files, allowing attackers to upload files with arbitrary extensions, including HTML files containing XSS payloads and Python files. This vulnerability, present in the latest version as of 20240310, could lead to stored XSS attacks and potentially result in remote code execution (RCE) on the server hosting the application.

Affected Version(s)

gaizhenbiao/chuanhuchatgpt <= unspecified

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Risk change from: null to: 6.5 - (MEDIUM)

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database
.