gaizhenbiao/chuanhuchatgpt version git d4ec6a3 is affected by a local file inclusion vulnerability due to the use of the gradio component gr.JSON, which has a known issue (CVE-2024-4941). This vulnerability allows unauthenticated users to access arbitrary files on the server by uploading a specially crafted JSON file and exploiting the improper input validation in the handle_dataset_selection function.
References
Link | Resource |
---|---|
https://huntr.com/bounties/98fdedea-6ad0-4157-b7d2-ae71c9786ee8 | Exploit Third Party Advisory |
Configurations
History
31 Jul 2025, 15:44
Type | Values Removed | Values Added |
---|---|---|
First Time |
Gaizhenbiao
Gaizhenbiao chuanhuchatgpt |
|
Summary |
|
|
References | () https://huntr.com/bounties/98fdedea-6ad0-4157-b7d2-ae71c9786ee8 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:2024-09-25:*:*:*:*:*:*:* | |
CWE | NVD-CWE-noinfo |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-31 15:44
NVD link : CVE-2024-10707
Mitre link : CVE-2024-10707
CVE.ORG link : CVE-2024-10707
JSON object : View
Products Affected
gaizhenbiao
- chuanhuchatgpt
CWE