Exploit
CVE-2024-5823

External Control of File Name or Path (CWE-73)

Published: Oct 29, 2024 / Updated: 21d ago

010
CVSS 9.1EPSS 0.04%Critical
CVE info copied to clipboard

Summary

A file overwrite vulnerability exists in gaizhenbiao/chuanhuchatgpt versions <= 20240410. This vulnerability allows an attacker to gain unauthorized access to overwrite critical configuration files within the system. Exploiting this vulnerability can lead to unauthorized changes in system behavior or security settings. Additionally, tampering with these configuration files can result in a denial of service (DoS) condition, disrupting normal system operation.

Impact

The impact of this vulnerability is severe. An attacker can exploit this vulnerability to overwrite critical configuration files, potentially leading to: 1. Unauthorized changes in system behavior or security settings, which could compromise the integrity of the entire system. 2. Denial of Service (DoS) conditions, disrupting normal system operations and affecting availability. 3. Potential for further exploitation by modifying security configurations. The vulnerability has a CVSS v3.1 base score of 9.1 (Critical), with high impact on integrity and availability. It requires no user interaction and can be exploited over the network without authentication, making it relatively easy for attackers to leverage.

Exploitation

One proof-of-concept exploit is available on huntr.com. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. The vulnerability has been addressed in a commit on GitHub. The patch was added on 2024-10-31, and can be found at: https://github.com/gaizhenbiao/chuanhuchatgpt/commit/720c23d755a4a955dcb0a54e8c200a2247a27f8b

Mitigation

1. Immediately update gaizhenbiao/chuanhuchatgpt to a version newer than 2024-04-10. 2. If immediate patching is not possible, implement strict access controls to limit who can interact with the affected system. 3. Monitor system logs for any suspicious file modification activities. 4. Implement file integrity monitoring on critical configuration files. 5. Use the principle of least privilege for all system accounts and processes. 6. Consider implementing additional network segmentation to isolate vulnerable systems until patching is complete.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

Timeline

CVE Assignment

NVD published the first details for CVE-2024-5823

Oct 29, 2024 at 1:15 PM
First Article

Feedly found the first article mentioning CVE-2024-5823. See article

Oct 29, 2024 at 1:21 PM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Oct 29, 2024 at 1:22 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.9%)

Oct 30, 2024 at 10:18 AM
CVSS

A CVSS base score of 9.1 has been assigned.

Oct 31, 2024 at 6:10 PM / nvd
Proof of Concept (PoC) Released

A proof of concept exploit has been released

Oct 31, 2024 at 9:11 PM
Static CVE Timeline Graph

Affected Systems

Gaizhenbiao/chuanhuchatgpt
+null more

Exploits

https://huntr.com/bounties/ca361701-7d68-4df6-8da0-caad4b85b9ae
+null more

Patches

github.com
+null more

Links to Mitre Att&cks

T1562.003: Impair Command History Logging
+null more

Attack Patterns

CAPEC-13: Subverting Environment Variable Values
+null more

News

US-CERT Vulnerability Summary for the Week of October 28, 2024
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High : vulnerabilities with a CVSS base score of 7.0–10.0 Medium : vulnerabilities with a CVSS base score of 4.0–6.9 Low : vulnerabilities with a CVSS base score of 0.0–3.9 Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available.
Vulnerability Summary for the Week of October 28, 2024
High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source Info Patch Info acnoo -- flutter_api Authentication Bypass Using an Alternate Path or Channel vulnerability in Acnoo Acnoo Flutter API allows Authentication Bypass.This issue affects Acnoo Flutter API: from n/a through 1.0.5. 2024-10-28 9.8 CVE-2024-50486 audit@patchstack.com adirectory--aDirectory Unrestricted Upload of File with Dangerous Type vulnerability in adirectory aDirectory allows Upload a Web Shell to a Web Server.This issue affects aDirectory: from n/a through 1.3. 2024-10-29 10 CVE-2024-50420 audit@patchstack.com Ajar Productions--Ajar in5 Embed Unrestricted Upload of File with Dangerous Type vulnerability in Ajar Productions Ajar in5 Embed allows Upload a Web Shell to a Web Server.This issue affects Ajar in5 Embed: from n/a through 3.1.3. 2024-10-29 10 CVE-2024-50473 audit@patchstack.com Amin Omer--Sudan Payment Gateway for WooCommerce Unrestricted Upload of File with Dangerous Type vulnerability in Amin Omer Sudan Payment Gateway for WooCommerce allows Upload a Web Shell to a Web Server.This issue affects Sudan Payment Gateway for WooCommerce: from n/a through 1.2.2. 2024-10-29 10 CVE-2024-50494 audit@patchstack.com amu02aftab--Enable Shortcodes inside Widgets,Comments and Experts The The Enable Shortcodes inside Widgets,Comments and Experts plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.0.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode.
CVE-2024-5823 Exploit
CVE Id : CVE-2024-5823 Published Date: 2024-10-31T18:05:00+00:00 A file overwrite vulnerability exists in gaizhenbiao/chuanhuchatgpt versions inTheWild added a link to an exploit: https://huntr.com/bounties/ca361701-7d68-4df6-8da0-caad4b85b9ae
NA - CVE-2024-5823 - A file overwrite vulnerability exists in...
A file overwrite vulnerability exists in gaizhenbiao/chuanhuchatgpt versions
CVE-2024-5823 | gaizhenbiao ChuanhuChatGPT up to 20240410 Setting file inclusion
A vulnerability, which was classified as critical , has been found in gaizhenbiao ChuanhuChatGPT up to 20240410 . This issue affects some unknown processing of the component Setting Handler . The manipulation leads to file inclusion. The identification of this vulnerability is CVE-2024-5823 . The attack may be initiated remotely. There is no exploit available. It is recommended to apply a patch to fix this issue.
See 5 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:None
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI