In gaizhenbiao/chuanhuchatgpt, specifically the version tagged as 20240121, there exists a vulnerability due to improper access control mechanisms. This flaw allows an authenticated attacker to bypass intended access restrictions and read the history
files of other users, potentially leading to unauthorized access to sensitive information. The vulnerability is present in the applications handling of access control for the history
path, where no adequate mechanism is in place to prevent an authenticated user from accessing another users chat history files. This issue poses a significant risk as it could allow attackers to obtain sensitive information from the chat history of other users.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Chuanhuchatgpt | Gaizhenbiao | * | 20240919-4 (excluding) |
Access control involves the use of several protection mechanisms such as:
When any mechanism is not applied or otherwise fails, attackers can compromise the security of the product by gaining privileges, reading sensitive information, executing commands, evading detection, etc. There are two distinct behaviors that can introduce access control weaknesses: