CVE-2024-7962

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-7962
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-7962.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-7962
Aliases
Published
2024-10-29T13:15:10Z
Modified
2025-07-01T16:16:43.390389Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

An arbitrary file read vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240628 due to insufficient validation when loading prompt template files. An attacker can read any file that matches specific criteria using an absolute path. The file must not have a .json extension and, except for the first line, every other line must contain commas. This vulnerability allows reading parts of format-compliant files, including code and log files, which may contain highly sensitive information such as account credentials.

References

Affected packages

Git / github.com/gaizhenbiao/chuanhuchatgpt

Affected ranges

Type
GIT
Repo
https://github.com/gaizhenbiao/chuanhuchatgpt
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

20230303
20230305
20230307
20230310
20230314
20230317
20230320
20230323
20230327
20230330
20230405
20230409
20230413
20230417
20230422
20230427
20230502
20230507
20230513
20230520
20230526
20230601
20230614
20230619
20230628
20230709
20230719
20230728
20230809
20230820
20230830
20230911
20230916
20230926
20231006
20231020
20231110
20231215
20231223
20240121
20240305
20240310
20240410
20240628
20240802
20240914