First published: Tue Mar 05 2024(Updated: )
A Server-Side Request Forgery (SSRF) in pictureproxy.php of ChatGPT commit f9f4bbc allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the urlparameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dirk1983 Chatgpt | =2023-05-23 | |
OpenAI API |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27564 is classified as a high severity vulnerability due to its potential to exploit server-side request forgery.
To fix CVE-2024-27564, update to the latest version of ChatGPT that addresses this vulnerability.
CVE-2024-27564 allows attackers to send arbitrary requests from the server, which can lead to data leaks or further exploitation.
CVE-2024-27564 affects version 2023-05-23 of ChatGPT.
CVE-2024-27564 can be easily exploited if the application improperly handles URL inputs.