Exploit
CVE-2024-7962

Path Traversal: '\..\filename' (CWE-29)

Published: Oct 29, 2024 / Updated: 21d ago

010
CVSS 7.5EPSS 0.04%High
CVE info copied to clipboard

Summary

An arbitrary file read vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240628 due to insufficient validation when loading prompt template files. This vulnerability allows an attacker to read any file that matches specific criteria using an absolute path. The file must not have a .json extension and, except for the first line, every other line must contain commas. This vulnerability allows reading parts of format-compliant files, including code and log files, which may contain highly sensitive information such as account credentials.

Impact

This vulnerability allows attackers to read sensitive information from affected systems. Attacks exploiting this vulnerability could lead to unauthorized access to sensitive data, including account credentials found in code and log files. This could potentially lead to further compromise of the system or related accounts. The confidentiality impact is rated as HIGH, while integrity and availability impacts are NONE, indicating that the primary concern is data exposure rather than system modification or disruption.

Exploitation

One proof-of-concept exploit is available on huntr.com. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. The vulnerability was addressed in a commit on GitHub on October 31, 2024. The patch can be found at: https://github.com/gaizhenbiao/chuanhuchatgpt/commit/2836fd1db3efcd5ede63c0e7fbbdf677730dbb51

Mitigation

1. Update gaizhenbiao/chuanhuchatgpt to a version later than 20240628 that includes the security patch. 2. Implement strict input validation for file paths, ensuring that only intended directories and files can be accessed. 3. Use a whitelist approach for allowed file types and locations. 4. Implement proper access controls to sensitive files and directories. 5. Regularly audit and monitor system logs for any suspicious file access attempts. 6. Consider implementing additional security layers such as Web Application Firewalls (WAF) to help detect and prevent path traversal attacks.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Timeline

CVE Assignment

NVD published the first details for CVE-2024-7962

Oct 29, 2024 at 1:15 PM
First Article

Feedly found the first article mentioning CVE-2024-7962. See article

Oct 29, 2024 at 1:21 PM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Oct 29, 2024 at 1:22 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.9%)

Oct 30, 2024 at 10:18 AM
CVSS

A CVSS base score of 7.5 has been assigned.

Oct 31, 2024 at 4:15 PM / nvd
Proof of Concept (PoC) Released

A proof of concept exploit has been released

Oct 31, 2024 at 7:11 PM
Static CVE Timeline Graph

Affected Systems

Gaizhenbiao/chuanhuchatgpt
+null more

Exploits

https://huntr.com/bounties/83f0a8e1-490c-49e7-b334-02125ee0f1b1
+null more

Patches

github.com
+null more

Attack Patterns

CAPEC-126: Path Traversal
+null more

News

US-CERT Vulnerability Summary for the Week of October 28, 2024
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High : vulnerabilities with a CVSS base score of 7.0–10.0 Medium : vulnerabilities with a CVSS base score of 4.0–6.9 Low : vulnerabilities with a CVSS base score of 0.0–3.9 Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available.
Vulnerability Summary for the Week of October 28, 2024
High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source Info Patch Info acnoo -- flutter_api Authentication Bypass Using an Alternate Path or Channel vulnerability in Acnoo Acnoo Flutter API allows Authentication Bypass.This issue affects Acnoo Flutter API: from n/a through 1.0.5. 2024-10-28 9.8 CVE-2024-50486 audit@patchstack.com adirectory--aDirectory Unrestricted Upload of File with Dangerous Type vulnerability in adirectory aDirectory allows Upload a Web Shell to a Web Server.This issue affects aDirectory: from n/a through 1.3. 2024-10-29 10 CVE-2024-50420 audit@patchstack.com Ajar Productions--Ajar in5 Embed Unrestricted Upload of File with Dangerous Type vulnerability in Ajar Productions Ajar in5 Embed allows Upload a Web Shell to a Web Server.This issue affects Ajar in5 Embed: from n/a through 3.1.3. 2024-10-29 10 CVE-2024-50473 audit@patchstack.com Amin Omer--Sudan Payment Gateway for WooCommerce Unrestricted Upload of File with Dangerous Type vulnerability in Amin Omer Sudan Payment Gateway for WooCommerce allows Upload a Web Shell to a Web Server.This issue affects Sudan Payment Gateway for WooCommerce: from n/a through 1.2.2. 2024-10-29 10 CVE-2024-50494 audit@patchstack.com amu02aftab--Enable Shortcodes inside Widgets,Comments and Experts The The Enable Shortcodes inside Widgets,Comments and Experts plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.0.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode.
CVE-2024-7962 Exploit
CVE Id : CVE-2024-7962 Published Date: 2024-10-31T16:14:00+00:00 An arbitrary file read vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240628 due to insufficient validation when loading prompt template files. An attacker can read any file that matches specific criteria using an absolute path. The file must not have a .json extension and, except for the first line, every other line must contain commas. This vulnerability allows reading parts of format-compliant files, including code and log files, which may contain highly sensitive information such as account credentials. inTheWild added a link to an exploit: https://huntr.com/bounties/83f0a8e1-490c-49e7-b334-02125ee0f1b1
CVE-2024-7962 - Exploits & Severity - Feedly
News ... A vulnerability was found in gaizhenbiao ChuanhuChatGPT up to 20240628 . It has been rated as problematic . This issue affects some unknown ...
CVE-2024-7962
This vulnerability allows reading parts of format-compliant files, including code and log files, which may contain highly sensitive information such as account credentials. Gravedad 3.1 (CVSS 3.1 Base Score)
See 6 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:None
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI