PT-2024-21948 · Unknown+1 · Pictureproxy.Php+1
Zer0Yu
·
Published
2024-03-05
·
Updated
2026-02-13
·
CVE-2024-27564
CVSS v3.1
6.5
Medium
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
Name of the Vulnerable Software and Affected Versions
ChatGPT versions (affected versions not specified)
Description
A server-side request forgery (SSRF) vulnerability exists in the
pictureproxy.php file of ChatGPT, specifically within commit f9f4bbc. This flaw allows attackers to force the application to make arbitrary requests by injecting crafted URLs into the url parameter. The vulnerability is actively being exploited, with over 10,000 attack attempts recorded in a single week, primarily targeting financial and government organizations in the United States, as well as entities in Germany, Thailand, Indonesia, Colombia, and the United Kingdom. The vulnerability does not require authentication and a proof-of-concept exploit is publicly available. Approximately 35% of organizations are potentially vulnerable due to misconfigured firewalls, IPS, and WAFs. The issue was initially identified in September 2023. Exploitation can lead to unauthorized access to internal resources and potential data theft. The API endpoint involved is related to image proxying through pictureproxy.php, and the vulnerable parameter is url.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
SSRF
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Chatgpt
Pictureproxy.Php