CVE-2025-0188

6.5 MEDIUM

📋 TL;DR

A Server-Side Request Forgery (SSRF) vulnerability in gaizhenbiao/chuanhuchatgpt allows attackers to make the application send requests to internal systems by manipulating URL responses. This affects users running version 20240914 of this ChatGPT-related software, potentially exposing internal network resources to unauthorized access.

💻 Affected Systems

Products:
  • gaizhenbiao/chuanhuchatgpt
Versions: 20240914
Operating Systems: all
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations using the vulnerable version; other versions may not be impacted.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of internal systems, data exfiltration from cloud metadata services, lateral movement within networks, and service disruption through internal resource exhaustion.

🟠

Likely Case

Unauthorized access to internal HTTP services, port scanning of internal networks, and potential data leakage from internal APIs or services.

🟢

If Mitigated

Limited to port scanning and reconnaissance of internal services without authentication bypass or data access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on huntr.com; SSRF vulnerabilities are commonly weaponized due to their versatility.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 20240915 or later

Vendor Advisory: https://huntr.com/bounties/879d2470-eca5-49c0-b3d1-57469cfff412

Restart Required: Yes

Instructions:

1. Update to version 20240915 or later from the official repository. 2. Restart the application service. 3. Verify the fix by checking the version and testing SSRF vectors.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict outbound network access from the application server to only necessary external services.

iptables -A OUTPUT -p tcp --dport 80 -j DROP
iptables -A OUTPUT -p tcp --dport 443 -j DROP

Input Validation

all

Implement URL validation to reject requests to internal IP ranges and localhost.

🧯 If You Can't Patch

  • Deploy a web application firewall (WAF) with SSRF protection rules
  • Isolate the application in a restricted network segment with no internal access

🔍 How to Verify

Check if Vulnerable:

Check if the application version is 20240914 by examining the codebase or configuration files.

Check Version:

grep -r '20240914' /path/to/chuanhuchatgpt/ or check the repository commit history

Verify Fix Applied:

Test SSRF vectors by attempting to request internal URLs (e.g., http://localhost, http://169.254.169.254) and verify they are blocked or sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from the application to internal IPs
  • Requests to metadata endpoints (169.254.169.254, 192.168.*)

Network Indicators:

  • HTTP traffic from application server to internal network segments
  • Port scanning patterns originating from the application

SIEM Query:

source="application_logs" AND (url="*localhost*" OR url="*169.254.169.254*" OR url="*192.168.*" OR url="*10.*")

🔗 References

📤 Share & Export