Insufficient Patch for Multipart Boundary DoS Vulnerability
An unauthenticated Denial of Service (DoS) vulnerability (CVE-2024-7807) was identified in ChuanhuChatGPT version 20240918. The vulnerability allows attackers to exploit the system by sending large data payloads using a multipart boundary. Although a patch was applied, the issue persists and was not fully mitigated.
Available publicly on Dec 20 2024
Threat Overview
The vulnerability in ChuanhuChatGPT allows an attacker to perform a Denial of Service (DoS) attack by sending large data payloads using a multipart boundary. The initial patch for CVE-2024-7807 was insufficient, as the system can still be overwhelmed by sending data in groups with 10 characters per line across multiple lines. This results in uncontrolled resource consumption, causing the service to become unavailable. The vulnerability requires low privilege access if authentication is enabled due to a version upgrade in Gradio.
Attack Scenario
An attacker could exploit this vulnerability by crafting a malicious payload with a large number of lines, each containing 10 characters, and sending it to the ChuanhuChatGPT server. This would cause the server to consume excessive resources, leading to a Denial of Service (DoS) and making the service unavailable to legitimate users.
Who is affected
Users and organizations relying on ChuanhuChatGPT version 20240918 are affected by this vulnerability. This includes any deployment where the service is exposed to unauthenticated or low-privilege users.
Technical Report
Want more out of Sightline?
Sightline offers even more for premium customers
Go Premium
We have - related security advisories that are available with Sightline Premium.