CVE-2024-5823
CRITICALDescription
A file overwrite vulnerability exists in gaizhenbiao/chuanhuchatgpt versions <= 20240410. This vulnerability allows an attacker to gain unauthorized access to overwrite critical configuration files within the system. Exploiting this vulnerability can lead to unauthorized changes in system behavior or security settings. Additionally, tampering with these configuration files can result in a denial of service (DoS) condition, disrupting normal system operation.
CVSS v3.1 Score
Weakness Type (CWE)
Affected Products
| Vendor | Product |
|---|---|
| gaizhenbiao | chuanhuchatgpt |
References
Frequently Asked Questions
What is CVE-2024-5823? +
How severe is CVE-2024-5823? +
What products are affected by CVE-2024-5823? +
How do I check if I'm vulnerable to CVE-2024-5823? +
Related Vulnerabilities
SEPPmail Secure Email Gateway before version 15.0.4 contains an unauthenticated path traversal vulnerability in the identifier parameter of /api.app/attachment/preview that …
Patch traversal, External Control of File Name or Path vulnerability in Iocharger Home allows deletion of arbitrary files This issue …
An unauthenticated file deletion vulnerability in the Palo Alto Networks PAN-OS management web interface enables an unauthenticated attacker with network …
imFAQ is an advanced questions and answers management system for ImpressCMS. Prior to 1.0.1, if the $_GET['seoOp'] parameter is manipulated …
An External Control of File Name or Path vulnerability in the APROL Web Portal used in B&R APROL <4.4-005P may …
Improper input validation in the OSSEC HIDS agent for Windows prior to version 3.8.0 allows an attacker in with control …