A Local File Inclusion (LFI) vulnerability exists in the gaizhenbiao/chuanhuchatgpt application, specifically within the functionality for uploading chat history. The vulnerability arises due to improper input validation when handling file paths during the chat history upload process. An attacker can exploit this vulnerability by intercepting requests and manipulating the 'name' parameter to specify arbitrary file paths. This allows the attacker to read sensitive files on the server, leading to information leakage, including API keys and private information. The issue affects version 20240310 of the application.
Metrics
Affected Vendors & Products
References
History
Thu, 10 Jul 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gaizhenbiao
Gaizhenbiao chuanhuchatgpt |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:20240310:*:*:*:*:*:*:* | |
Vendors & Products |
Gaizhenbiao
Gaizhenbiao chuanhuchatgpt |

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-05-16T09:03:46.604Z
Updated: 2024-08-01T20:40:46.483Z
Reserved: 2024-04-29T18:37:03.454Z
Link: CVE-2024-4321

Updated: 2024-08-01T20:40:46.483Z

Status : Analyzed
Published: 2024-05-16T09:15:16.327
Modified: 2025-07-10T16:21:16.573
Link: CVE-2024-4321

No data.