High

chuanhuchatgpt

SSRF Vulnerability in Upload Processing Interface

A Server-Side Request Forgery (SSRF) vulnerability was discovered in the upload processing interface of ChuanhuChatGPT, affecting versions up to ChuanhuChatGPT-20240410-git.zip. The vulnerability allows attackers to send crafted requests from the vulnerable server to internal or external resources. The issue has not yet been patched.

Available publicly on Jun 14 2024

7.3

CVSS:

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Credit:

qhaoduoyu
Remediation Steps
  • Validate and sanitize all user inputs to ensure they do not contain malicious URLs.
  • Implement allow-listing for URLs that the server is permitted to request.
  • Use network segmentation to limit the server's ability to make requests to internal resources.
  • Apply security patches and updates as soon as they are available.
  • Monitor and log server requests to detect any unusual or unauthorized activity.
Patch Details
  • Fixed Version: N/A
  • Patch Commit: N/A
Want more out of Sightline?

Sightline offers even more for premium customers

Go Premium

We have - related security advisories that are available with Sightline Premium.