We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-11171

Improper Input Validation in danny-avila/librechat



Description

In danny-avila/librechat version git 0c2a583, there is an improper input validation vulnerability. The application uses multer middleware for handling multipart file uploads. When using in-memory storage (the default setting for multer), there is no limit on the upload file size. This can lead to a server crash due to out-of-memory errors when handling large files. An attacker without any privileges can exploit this vulnerability to cause a complete denial of service. The issue is fixed in version 0.7.6.

Reserved 2024-11-12 | Published 2025-03-20 | Updated 2025-03-20 | Assigner @huntr_ai


HIGH: 7.5CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-20 Improper Input Validation

Product status

Any version before 0.7.6
affected

References

huntr.com/bounties/91717a5a-d653-4e35-b186-9e8d00aa4285

github.com/...ommit/bb58a2d0662ef86dc75a9d2f6560125c018e3836

cve.org (CVE-2024-11171)

nvd.nist.gov (CVE-2024-11171)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-11171

Support options

Helpdesk Chat, Email, Knowledgebase