{"dataType": "CVE_RECORD", "containers": {"cna": {"metrics": [{"format": "CVSS", "cvssV3_1": {"scope": "CHANGED", "version": "3.1", "baseScore": 5.8, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}}, {"format": "CVSS", "cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.5, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}}], "affected": [{"cpes": ["cpe:2.3:a:dirk1983:chatgpt:2023-05-23:*:*:*:*:*:*:*"], "vendor": "dirk1983", "product": "chatgpt", "versions": [{"status": "affected", "version": "2023-05-23"}], "defaultStatus": "unaffected"}], "references": [{"url": "https://github.com/dirk1983/chatgpt/issues/114", "tags": ["exploit", "issue-tracking", "mitigation", "vendor-advisory"]}, {"url": "https://web.archive.org/save/https://github.com/dirk1983/chatgpt/blob/f9f4bbc99eed7210b291ec116bd57b3d8276bee5/README.md"}, {"url": "https://web.archive.org/save/https://github.com/dirk1983/chatgpt/issues/114"}, {"url": "https://web.archive.org/web/20250320031248/https://mm1.ltd/"}, {"url": "https://web.archive.org/web/20250320032559/https://github.com/dirk1983/chatgpt/blob/f9f4bbc99eed7210b291ec116bd57b3d8276bee5/pictureproxy.php"}], "descriptions": [{"lang": "en", "value": "pictureproxy.php in the dirk1983 mm1.ltd source code f9f4bbc allows SSRF via the url parameter. NOTE: the references section has an archived copy of pictureproxy.php from its original GitHub location, but the repository name might later change because it is misleading."}, {"lang": "es", "value": "Server-Side Request Forgery (SSRF) en pictureproxy.php de ChatGPT commit f9f4bbc permite a los atacantes forzar a la aplicación a realizar solicitudes arbitrarias mediante la inyección de URL manipuladas en el parámetro url."}], "problemTypes": [{"descriptions": [{"lang": "en", "cweId": "CWE-918", "description": "CWE-918"}]}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000003", "shortName": "nvd", "dateUpdated": "2024-03-05T17:15:06Z", "x_subShortName": "nvd"}}}, "cveMetadata": {"cveId": "CVE-2024-27564", "state": "PUBLISHED", "dateUpdated": "2025-03-20T15:15:41Z", "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "datePublished": "2024-03-05T17:15:06Z", "assignerShortName": "mitre"}, "dataVersion": "5.0"}