Description
LibreChat version 0.7.9 is vulnerable to a Denial of Service (DoS) attack due to unbounded parameter values in the `/api/memories` endpoint. The `key` and `value` parameters accept arbitrarily large inputs without proper validation, leading to a null pointer error in the Rust-based backend when excessively large values are submitted. This results in the inability to create new memories, impacting the stability of the service.
Problem types
CWE-400 Uncontrolled Resource Consumption
Product status
References
huntr.com/bounties/e9d9404c-cd19-4226-a580-9cba14b7d7d6
github.com/...ommit/edf33bedcbb08c33e59df76f06454ed7efd896f9