Vulnerability Description
In gaizhenbiao/chuanhuchatgpt, specifically the version tagged as 20240121, there exists a vulnerability due to improper access control mechanisms. This flaw allows an authenticated attacker to bypass intended access restrictions and read the `history` files of other users, potentially leading to unauthorized access to sensitive information. The vulnerability is present in the application's handling of access control for the `history` path, where no adequate mechanism is in place to prevent an authenticated user from accessing another user's chat history files. This issue poses a significant risk as it could allow attackers to obtain sensitive information from the chat history of other users.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gaizhenbiao | Chuanhuchatgpt | < 20240919-4 |
Related Weaknesses (CWE)
References
- https://github.com/gaizhenbiao/chuanhuchatgpt/commit/ccc7479ace5c9e1a1d9f4daf2e7
- https://huntr.com/bounties/ed32fc32-cb8f-4fbd-8209-cc835d279699ExploitIssue TrackingPatch
- https://huntr.com/bounties/ed32fc32-cb8f-4fbd-8209-cc835d279699ExploitIssue TrackingPatch
FAQ
What is CVE-2024-3404?
CVE-2024-3404 is a vulnerability with a CVSS score of 6.5 (MEDIUM). In gaizhenbiao/chuanhuchatgpt, specifically the version tagged as 20240121, there exists a vulnerability due to improper access control mechanisms. This flaw allows an authenticated attacker to bypass...
How severe is CVE-2024-3404?
CVE-2024-3404 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-3404?
Check the references section above for vendor advisories and patch information. Affected products include: Gaizhenbiao Chuanhuchatgpt.