CVE-2023-51409 Scanner

CVE-2023-51409 Scanner - Unrestricted File Upload vulnerability in AI Engine - ChatGPT Chatbot

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

13 days 17 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

The AI Engine - ChatGPT Chatbot is a popular plugin used in conjunction with WordPress to enable AI-driven chatbot functionality on websites. Developed by MeowApps, it provides webmasters with tools to integrate and customize AI chatbots for customer service, support, and engagement on their platforms. Its integration capabilities and user-friendly setup make it a convenient choice for businesses seeking to enhance user interaction with AI. The plugin is utilized by a diverse range of online services, from small businesses to larger e-commerce platforms, thanks to its flexible and robust AI handling capabilities.

The vulnerability identified in the AI Engine - ChatGPT Chatbot plugin is an Unrestricted File Upload issue. This kind of vulnerability occurs when a web application allows files to be uploaded without appropriate validation, exposing the system to files of potentially dangerous types. If exploited, it can lead to unauthorized actions like the execution of arbitrary code on the server. The vulnerability affects versions of the plugin from n/a through 1.9.98, presenting a significant risk to users running these versions without proper security patches.

Technically, the vulnerability exists in the file upload endpoint ("/wp-json/mwai-ui/v1/files/upload") of the plugin. It allows attackers to upload arbitrary PHP files due to insufficient checks on the uploaded file's type, making the application susceptible to malicious PHP code execution. The payload typically contains a crafted file that bypasses content type validation, and once uploaded, it can be accessed and executed remotely. The vulnerability is exploited through a POST request, demonstrating a lack of adequate endpoint security measures to validate or sanitize file type and content.

As a result of exploiting this vulnerability, attackers can execute code remotely, potentially leading to full system access and control. This could result in unauthorized access to sensitive data, defacement or takeover of the web application, and further lateral attacks within the hosting environment. Users may find themselves vulnerable to data breaches, loss of user trust, and damages to business operations.

REFERENCES

Get started to protecting your digital assets