An unauthenticated Denial of Service (DoS) vulnerability was identified in ChuanhuChatGPT version 20240918, which could be exploited by sending large data payloads using a multipart boundary. Although a patch was applied for CVE-2024-7807, the issue can still be exploited by sending data in groups with 10 characters in a line, with multiple lines. This can cause the system to continuously process these characters, resulting in prolonged unavailability of the service. The exploitation now requires low privilege if authentication is enabled due to a version upgrade in Gradio.
References
Link | Resource |
---|---|
https://huntr.com/bounties/f820371d-a878-44bf-b1fd-2d837dd58eb4 | Exploit Third Party Advisory |
https://huntr.com/bounties/f820371d-a878-44bf-b1fd-2d837dd58eb4 | Exploit Third Party Advisory |
Configurations
History
14 Jul 2025, 13:03
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
References | () https://huntr.com/bounties/f820371d-a878-44bf-b1fd-2d837dd58eb4 - Exploit, Third Party Advisory | |
Summary |
|
|
CPE | cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:20240918:*:*:*:*:*:*:* | |
First Time |
Gaizhenbiao
Gaizhenbiao chuanhuchatgpt |
20 Mar 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/f820371d-a878-44bf-b1fd-2d837dd58eb4 - |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-14 13:03
NVD link : CVE-2024-10650
Mitre link : CVE-2024-10650
CVE.ORG link : CVE-2024-10650
JSON object : View
Products Affected
gaizhenbiao
- chuanhuchatgpt
CWE