gaizhenbiao/chuanhuchatgpt is vulnerable to improper access control, allowing unauthorized access to the `config.json` file. This vulnerability is present in both authenticated and unauthenticated versions of the application, enabling attackers to obtain sensitive information such as API keys (`openai_api_key`, `google_palm_api_key`, `xmchat_api_key`, etc.), configuration details, and user credentials. The issue stems from the application's handling of HTTP requests for the `config.json` file, which does not properly restrict access based on user authentication.
Metrics
Affected Vendors & Products
References
History
Tue, 29 Jul 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:20240121:*:*:*:*:*:*:* |

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-04-10T17:08:02.787Z
Updated: 2024-08-22T18:08:10.258Z
Reserved: 2024-03-06T10:53:37.591Z
Link: CVE-2024-2217

Updated: 2024-08-01T19:03:39.126Z

Status : Analyzed
Published: 2024-04-10T17:15:54.440
Modified: 2025-07-29T20:21:19.807
Link: CVE-2024-2217

No data.