Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-53mw-8pff-677j

Опубликовано: 31 июл. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 8.2

Описание

A vulnerability in the JSON file handling of gaizhenbiao/chuanhuchatgpt version 20240410 allows any user to delete any JSON file on the server, including critical configuration files such as config.json and ds_config_chatbot.json. This issue arises due to improper validation of file paths, enabling directory traversal attacks. An attacker can exploit this vulnerability to disrupt the functioning of the system, manipulate settings, or potentially cause data loss or corruption.

A vulnerability in the JSON file handling of gaizhenbiao/chuanhuchatgpt version 20240410 allows any user to delete any JSON file on the server, including critical configuration files such as config.json and ds_config_chatbot.json. This issue arises due to improper validation of file paths, enabling directory traversal attacks. An attacker can exploit this vulnerability to disrupt the functioning of the system, manipulate settings, or potentially cause data loss or corruption.

EPSS

Процентиль: 89%
0.04972
Низкий

8.2 High

CVSS3

Дефекты

CWE-22
CWE-73

Связанные уязвимости

CVSS3: 8.2
nvd
больше 1 года назад

A vulnerability in the JSON file handling of gaizhenbiao/chuanhuchatgpt version 20240410 allows any user to delete any JSON file on the server, including critical configuration files such as `config.json` and `ds_config_chatbot.json`. This issue arises due to improper validation of file paths, enabling directory traversal attacks. An attacker can exploit this vulnerability to disrupt the functioning of the system, manipulate settings, or potentially cause data loss or corruption.

EPSS

Процентиль: 89%
0.04972
Низкий

8.2 High

CVSS3

Дефекты

CWE-22
CWE-73