PT-2024-21948 · Unknown+1 · Pictureproxy.Php+1

Zer0Yu

·

Published

2024-03-05

·

Updated

2026-02-13

·

CVE-2024-27564

CVSS v3.1

6.5

Medium

VectorAV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Name of the Vulnerable Software and Affected Versions ChatGPT versions (affected versions not specified)
Description A server-side request forgery (SSRF) vulnerability exists in the pictureproxy.php file of ChatGPT, specifically within commit f9f4bbc. This flaw allows attackers to force the application to make arbitrary requests by injecting crafted URLs into the url parameter. The vulnerability is actively being exploited, with over 10,000 attack attempts recorded in a single week, primarily targeting financial and government organizations in the United States, as well as entities in Germany, Thailand, Indonesia, Colombia, and the United Kingdom. The vulnerability does not require authentication and a proof-of-concept exploit is publicly available. Approximately 35% of organizations are potentially vulnerable due to misconfigured firewalls, IPS, and WAFs. The issue was initially identified in September 2023. Exploitation can lead to unauthorized access to internal resources and potential data theft. The API endpoint involved is related to image proxying through pictureproxy.php, and the vulnerable parameter is url.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

SSRF

Weakness Enumeration

Related Identifiers

CVE-2024-27564

Affected Products

Chatgpt
Pictureproxy.Php