CVE-2024-10650
UNKNOWNChuanhuChatGPT: DoS via multipart payload exhaustion
ChuanhuChatGPT remains vulnerable to DoS despite a prior patch (CVE-2024-7807) — attackers can craft multipart requests with specific 10-char-per-line patterns to exhaust server processing with minimal bandwidth. Update immediately to the latest version and add WAF-level rate limiting on multipart requests. Low risk for most enterprises, but critical if this tool is exposed as a self-hosted ChatGPT interface to internal or external users.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| chuanhuchatgpt | — | — | No patch |
Do you use chuanhuchatgpt? You're affected.
Severity & Risk
Recommended Action
- 1. Upgrade ChuanhuChatGPT beyond version 20240918 immediately. 2. Add WAF/proxy rules to enforce maximum multipart part count and line length limits. 3. Configure request size limits and connection timeouts at the reverse proxy (nginx/Caddy) layer. 4. Enable authentication if not already active — reduces attack surface from unauthenticated to low-privilege. 5. Monitor access logs for anomalous multipart request volumes or unusual boundary patterns as a detection signal.
Classification
Compliance Impact
This CVE is relevant to:
Technical Details
NVD Description
An unauthenticated Denial of Service (DoS) vulnerability was identified in ChuanhuChatGPT version 20240918, which could be exploited by sending large data payloads using a multipart boundary. Although a patch was applied for CVE-2024-7807, the issue can still be exploited by sending data in groups with 10 characters in a line, with multiple lines. This can cause the system to continuously process these characters, resulting in prolonged unavailability of the service. The exploitation now requires low privilege if authentication is enabled due to a version upgrade in Gradio.
Exploitation Scenario
An adversary sends crafted HTTP multipart POST requests to the ChuanhuChatGPT endpoint, structuring the multipart body with boundaries split into groups of exactly 10 characters per line across many lines. The server iterates character-by-character over this crafted structure, consuming CPU in a tight processing loop. A single attacker with low bandwidth can sustain the condition indefinitely, keeping the service unavailable for legitimate users without triggering volumetric DoS detection thresholds.
Weaknesses (CWE)
References
- huntr.com/bounties/f820371d-a878-44bf-b1fd-2d837dd58eb4 Exploit 3rd Party
- huntr.com/bounties/f820371d-a878-44bf-b1fd-2d837dd58eb4 Exploit 3rd Party