Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6090: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in gaizhenbiao gaizhenbiao/chuanhuchatgpt

0
High
VulnerabilityCVE-2024-6090cvecve-2024-6090cwe-22
Published: Thu Jun 27 2024 (06/27/2024, 18:40:51 UTC)
Source: CVE Database V5
Vendor/Project: gaizhenbiao
Product: gaizhenbiao/chuanhuchatgpt

Description

A path traversal vulnerability exists in gaizhenbiao/chuanhuchatgpt version 20240410, allowing any user to delete other users' chat histories. This vulnerability can also be exploited to delete any files ending in `.json` on the target system, leading to a denial of service as users are unable to authenticate.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:35:03 UTC

Technical Analysis

CVE-2024-6090 is a path traversal vulnerability (CWE-22) identified in the gaizhenbiao/chuanhuchatgpt software, specifically in version 20240410. The flaw allows an attacker to manipulate file path inputs to bypass directory restrictions, enabling deletion of arbitrary files ending with the .json extension on the target system. This includes the ability to delete other users' chat histories stored as JSON files, as well as critical authentication-related files, resulting in denial of service by preventing legitimate user authentication. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The CVSS v3.0 score of 7.5 reflects high severity due to network attack vector, low attack complexity, no privileges required, and a significant impact on availability. No patches or known exploits have been reported yet, but the vulnerability poses a serious threat to the integrity of stored data and the availability of the chat service. The root cause is improper limitation of pathname inputs, allowing directory traversal sequences to escape intended restricted directories. This indicates insufficient input validation and lack of secure coding practices around file system operations within the application.

Potential Impact

For European organizations using gaizhenbiao/chuanhuchatgpt, this vulnerability can lead to critical service disruptions by deleting essential JSON files, including authentication data and user chat histories. This results in denial of service, loss of user data, and potential operational downtime. Organizations relying on this software for communication or AI chatbot services may face degraded user trust and productivity loss. The lack of authentication requirement means attackers can exploit this remotely without insider access, increasing exposure. If exploited at scale, it could disrupt multiple users or departments simultaneously. Additionally, deletion of authentication files may require costly recovery efforts and incident response. The impact extends beyond availability to potential indirect effects on confidentiality if attackers leverage deleted data to cause confusion or cover tracks. Overall, the threat undermines service reliability and data integrity critical to business continuity.

Mitigation Recommendations

Immediate mitigation should focus on applying any available patches from the vendor once released. In the absence of patches, organizations should implement strict input validation to sanitize and canonicalize all file path inputs, ensuring traversal sequences (e.g., ../) are blocked. Employing allowlists for file names and extensions can reduce risk. Restrict file deletion operations to authenticated and authorized users only, enforcing role-based access controls. Monitoring file system activity for unusual deletion patterns of .json files can provide early detection. Isolating the application in a sandbox or container with limited file system permissions can minimize impact. Regular backups of critical JSON files, especially authentication data and user histories, are essential for recovery. Network-level protections such as web application firewalls (WAFs) can help detect and block path traversal attempts. Finally, conduct code reviews and security testing focused on file handling to prevent similar issues in future releases.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-06-17T18:13:08.042Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b2a178f764e1f470d44

Added to database: 10/15/2025, 1:01:30 PM

Last enriched: 10/15/2025, 1:35:03 PM

Last updated: 10/16/2025, 2:53:24 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats