Home

Description

An unauthenticated Denial of Service (DoS) vulnerability was identified in ChuanhuChatGPT version 20240918, which could be exploited by sending large data payloads using a multipart boundary. Although a patch was applied for CVE-2024-7807, the issue can still be exploited by sending data in groups with 10 characters in a line, with multiple lines. This can cause the system to continuously process these characters, resulting in prolonged unavailability of the service. The exploitation now requires low privilege if authentication is enabled due to a version upgrade in Gradio.

PUBLISHED Reserved 2024-10-31 | Published 2025-03-20 | Updated 2025-10-15 | Assigner @huntr_ai




HIGH: 7.5CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-770 Allocation of Resources Without Limits or Throttling

Product status

Any version
affected

References

huntr.com/bounties/f820371d-a878-44bf-b1fd-2d837dd58eb4 exploit

huntr.com/bounties/f820371d-a878-44bf-b1fd-2d837dd58eb4

cve.org (CVE-2024-10650)

nvd.nist.gov (CVE-2024-10650)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.