CVE-2024-10650

An unauthenticated Denial of Service (DoS) vulnerability was identified in ChuanhuChatGPT version 20240918, which could be exploited by sending large data payloads using a multipart boundary. Although a patch was applied for CVE-2024-7807, the issue can still be exploited by sending data in groups with 10 characters in a line, with multiple lines. This can cause the system to continuously process these characters, resulting in prolonged unavailability of the service. The exploitation now requires low privilege if authentication is enabled due to a version upgrade in Gradio.
CVSS

No CVSS.

References
Configurations

Configuration 1 (hide)

cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:20240918:*:*:*:*:*:*:*

History

14 Jul 2025, 13:03

Type Values Removed Values Added
References () https://huntr.com/bounties/f820371d-a878-44bf-b1fd-2d837dd58eb4 - () https://huntr.com/bounties/f820371d-a878-44bf-b1fd-2d837dd58eb4 - Exploit, Third Party Advisory
CPE cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:20240918:*:*:*:*:*:*:*
First Time Gaizhenbiao
Gaizhenbiao chuanhuchatgpt
CWE NVD-CWE-noinfo

20 Mar 2025, 13:15

Type Values Removed Values Added
CWE CWE-400

20 Mar 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-20 10:15

Updated : 2025-07-14 13:03


NVD link : CVE-2024-10650

Mitre link : CVE-2024-10650


JSON object : View

Products Affected

gaizhenbiao

  • chuanhuchatgpt