gpt_academic's Configuration File vulnerable to File Information Disclosure
Description
gpt_academic provides a graphical interface for ChatGPT/GLM. A vulnerability was found in gpt_academic 3.37 and prior. This issue affects some unknown processing of the component Configuration File Handler. The manipulation of the argument file leads to information disclosure. Since no sensitive files are configured to be off-limits, sensitive information files in some working directories can be read through the /file route, leading to sensitive information leakage. This affects users that uses file configurations via config.py, config_private.py, Dockerfile. A patch is available at commit 1dcc2873d2168ad2d3d70afcb453ac1695fbdf02. As a workaround, one may use environment variables instead of config*.py files to configure this project, or use docker-compose installation to configure this project.
Affected products
1- Range: <= 3.37
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/binary-husky/gpt_academic/commit/1dcc2873d2168ad2d3d70afcb453ac1695fbdf02mitrex_refsource_MISC
- github.com/binary-husky/gpt_academic/security/advisories/GHSA-pg65-p24m-wf5gmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.