gaizhenbiao/chuanhuchatgpt is vulnerable to improper access control, allowing unauthorized access to the `config.json` file. This vulnerability is present in both authenticated and unauthenticated versions of the application, enabling attackers to obtain sensitive information such as API keys (`openai_api_key`, `google_palm_api_key`, `xmchat_api_key`, etc.), configuration details, and user credentials. The issue stems from the application's handling of HTTP requests for the `config.json` file, which does not properly restrict access based on user authentication.
References
Link | Resource |
---|---|
https://github.com/gaizhenbiao/chuanhuchatgpt/commit/c5ae3b5ae6b47259e0ce8730e0a47e85121f4a7d | Patch |
https://huntr.com/bounties/e4df74bf-b2ee-490f-a9c9-e5c8010b8b29 | Exploit Third Party Advisory |
https://github.com/gaizhenbiao/chuanhuchatgpt/commit/c5ae3b5ae6b47259e0ce8730e0a47e85121f4a7d | Patch |
https://huntr.com/bounties/e4df74bf-b2ee-490f-a9c9-e5c8010b8b29 | Exploit Third Party Advisory |
Configurations
History
29 Jul 2025, 20:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/gaizhenbiao/chuanhuchatgpt/commit/c5ae3b5ae6b47259e0ce8730e0a47e85121f4a7d - Patch | |
References | () https://huntr.com/bounties/e4df74bf-b2ee-490f-a9c9-e5c8010b8b29 - Exploit, Third Party Advisory | |
CWE | NVD-CWE-noinfo | |
First Time |
Gaizhenbiao
Gaizhenbiao chuanhuchatgpt |
|
CPE | cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:20240121:*:*:*:*:*:*:* |
Information
Published : 2024-04-10 17:15
Updated : 2025-07-29 20:21
NVD link : CVE-2024-2217
Mitre link : CVE-2024-2217
CVE.ORG link : CVE-2024-2217
JSON object : View
Products Affected
gaizhenbiao
- chuanhuchatgpt
CWE