pysec-2024-61
Vulnerability from pysec
Published
2024-07-11 11:15
Modified
2024-07-12 21:33
Severity ?
Details
A Stored Cross-Site Scripting (XSS) vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240410. This vulnerability allows an attacker to inject malicious JavaScript code into the chat history file. When a victim uploads this file, the malicious script is executed in the victim's browser. This can lead to user data theft, session hijacking, malware distribution, and phishing attacks.
Aliases
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "chuanhuchatgpt", "purl": "pkg:pypi/chuanhuchatgpt" }, "ranges": [ { "events": [ { "introduced": "0" } ], "type": "ECOSYSTEM" } ], "versions": [ "3.2.5" ] } ], "aliases": [ "CVE-2024-6035" ], "details": "A Stored Cross-Site Scripting (XSS) vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240410. This vulnerability allows an attacker to inject malicious JavaScript code into the chat history file. When a victim uploads this file, the malicious script is executed in the victim\u0027s browser. This can lead to user data theft, session hijacking, malware distribution, and phishing attacks.", "id": "PYSEC-2024-61", "modified": "2024-07-12T21:33:00.657381+00:00", "published": "2024-07-11T11:15:00+00:00", "references": [ { "type": "EVIDENCE", "url": "https://huntr.com/bounties/e4e8da71-53a9-4540-8d70-6b670b076987" }, { "type": "WEB", "url": "https://huntr.com/bounties/e4e8da71-53a9-4540-8d70-6b670b076987" } ], "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.