A vulnerability, which was classified as problematic, has been found in Chanzhaoyu chatgpt-web 2.11.1. This issue affects some unknown processing. The manipulation of the argument Description with the input <image src onerror=prompt(document.domain)> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249779.
References
Link | Resource |
---|---|
https://github.com/Chanzhaoyu/chatgpt-web/issues/2001 | Exploit Issue Tracking |
https://vuldb.com/?ctiid.249779 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.249779 | Permissions Required Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2024-01-08T01:31:03.607Z
Updated: 2024-01-08T01:31:03.607Z
Reserved: 2024-01-05T12:56:44.805Z
Link: CVE-2023-7215
JSON object: View
NVD Information
Status : Modified
Published: 2024-01-08T02:15:14.027
Modified: 2024-05-17T02:34:18.757
Link: CVE-2023-7215
JSON object: View
Redhat Information
No data.
CWE