CVE-2024-10650: CWE-770 Allocation of Resources Without Limits or Throttling in gaizhenbiao gaizhenbiao/chuanhuchatgpt
An unauthenticated Denial of Service (DoS) vulnerability was identified in ChuanhuChatGPT version 20240918, which could be exploited by sending large data payloads using a multipart boundary. Although a patch was applied for CVE-2024-7807, the issue can still be exploited by sending data in groups with 10 characters in a line, with multiple lines. This can cause the system to continuously process these characters, resulting in prolonged unavailability of the service. The exploitation now requires low privilege if authentication is enabled due to a version upgrade in Gradio.
AI Analysis
Technical Summary
CVE-2024-10650 is a Denial of Service vulnerability classified under CWE-770, which involves allocation of resources without proper limits or throttling. The affected product is ChuanhuChatGPT version 20240918 by gaizhenbiao. The vulnerability allows an unauthenticated attacker to send large multipart boundary payloads crafted with groups of 10 characters per line and multiple lines, causing the system to continuously process these inputs. This leads to resource exhaustion and prolonged unavailability of the service. Although a prior patch addressed a similar issue (CVE-2024-7807), this variant bypasses that fix by exploiting a different data formatting approach. The Gradio framework upgrade changed the authentication requirements, reducing the privilege needed to exploit the vulnerability when authentication is enabled to low privilege, but it remains exploitable without authentication if the system is open. The vulnerability impacts availability only, with no direct confidentiality or integrity compromise. The CVSS 3.0 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) indicates network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, no confidentiality or integrity impact, and high availability impact. No public exploits have been reported yet, but the ease of exploitation and high impact make this a significant risk for deployments of ChuanhuChatGPT, especially in environments relying on continuous AI chatbot availability.
Potential Impact
For European organizations, the primary impact is service unavailability of AI chatbot systems running ChuanhuChatGPT, which could disrupt business operations, customer interactions, and internal workflows relying on these AI services. Prolonged downtime could lead to loss of productivity, customer dissatisfaction, and potential financial losses. Organizations in sectors such as finance, healthcare, telecommunications, and public services that increasingly integrate AI chatbots for customer support or decision assistance are particularly vulnerable. The unauthenticated nature of the attack means that external threat actors can launch DoS attacks without needing credentials, increasing the risk of widespread disruption. Additionally, the low privilege requirement when authentication is enabled lowers the barrier for insider threats or compromised low-level accounts to exploit this vulnerability. While confidentiality and integrity are not directly impacted, the availability loss can indirectly affect trust and operational resilience. Given the growing reliance on AI-driven services in Europe, this vulnerability poses a significant operational risk if unmitigated.
Mitigation Recommendations
1. Apply patches or updates from the vendor as soon as they become available to address CVE-2024-10650 specifically. 2. Implement strict input validation and rate limiting on multipart/form-data payloads to prevent large or malformed data from overwhelming the system. 3. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious multipart boundary payload patterns, especially those with repetitive 10-character lines. 4. Monitor network traffic and application logs for unusual spikes in multipart/form-data requests or repeated patterns indicative of exploitation attempts. 5. Restrict access to the ChuanhuChatGPT service to trusted networks or authenticated users where possible, and enforce strong authentication and authorization controls. 6. Consider deploying resource usage quotas and timeouts on request processing to limit the impact of resource exhaustion attacks. 7. Conduct regular security assessments and penetration testing focusing on multipart data handling and DoS resilience. 8. Educate operational teams to recognize and respond quickly to service degradation symptoms that may indicate ongoing exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2024-10650: CWE-770 Allocation of Resources Without Limits or Throttling in gaizhenbiao gaizhenbiao/chuanhuchatgpt
Description
An unauthenticated Denial of Service (DoS) vulnerability was identified in ChuanhuChatGPT version 20240918, which could be exploited by sending large data payloads using a multipart boundary. Although a patch was applied for CVE-2024-7807, the issue can still be exploited by sending data in groups with 10 characters in a line, with multiple lines. This can cause the system to continuously process these characters, resulting in prolonged unavailability of the service. The exploitation now requires low privilege if authentication is enabled due to a version upgrade in Gradio.
AI-Powered Analysis
Technical Analysis
CVE-2024-10650 is a Denial of Service vulnerability classified under CWE-770, which involves allocation of resources without proper limits or throttling. The affected product is ChuanhuChatGPT version 20240918 by gaizhenbiao. The vulnerability allows an unauthenticated attacker to send large multipart boundary payloads crafted with groups of 10 characters per line and multiple lines, causing the system to continuously process these inputs. This leads to resource exhaustion and prolonged unavailability of the service. Although a prior patch addressed a similar issue (CVE-2024-7807), this variant bypasses that fix by exploiting a different data formatting approach. The Gradio framework upgrade changed the authentication requirements, reducing the privilege needed to exploit the vulnerability when authentication is enabled to low privilege, but it remains exploitable without authentication if the system is open. The vulnerability impacts availability only, with no direct confidentiality or integrity compromise. The CVSS 3.0 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) indicates network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, no confidentiality or integrity impact, and high availability impact. No public exploits have been reported yet, but the ease of exploitation and high impact make this a significant risk for deployments of ChuanhuChatGPT, especially in environments relying on continuous AI chatbot availability.
Potential Impact
For European organizations, the primary impact is service unavailability of AI chatbot systems running ChuanhuChatGPT, which could disrupt business operations, customer interactions, and internal workflows relying on these AI services. Prolonged downtime could lead to loss of productivity, customer dissatisfaction, and potential financial losses. Organizations in sectors such as finance, healthcare, telecommunications, and public services that increasingly integrate AI chatbots for customer support or decision assistance are particularly vulnerable. The unauthenticated nature of the attack means that external threat actors can launch DoS attacks without needing credentials, increasing the risk of widespread disruption. Additionally, the low privilege requirement when authentication is enabled lowers the barrier for insider threats or compromised low-level accounts to exploit this vulnerability. While confidentiality and integrity are not directly impacted, the availability loss can indirectly affect trust and operational resilience. Given the growing reliance on AI-driven services in Europe, this vulnerability poses a significant operational risk if unmitigated.
Mitigation Recommendations
1. Apply patches or updates from the vendor as soon as they become available to address CVE-2024-10650 specifically. 2. Implement strict input validation and rate limiting on multipart/form-data payloads to prevent large or malformed data from overwhelming the system. 3. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious multipart boundary payload patterns, especially those with repetitive 10-character lines. 4. Monitor network traffic and application logs for unusual spikes in multipart/form-data requests or repeated patterns indicative of exploitation attempts. 5. Restrict access to the ChuanhuChatGPT service to trusted networks or authenticated users where possible, and enforce strong authentication and authorization controls. 6. Consider deploying resource usage quotas and timeouts on request processing to limit the impact of resource exhaustion attacks. 7. Conduct regular security assessments and penetration testing focusing on multipart data handling and DoS resilience. 8. Educate operational teams to recognize and respond quickly to service degradation symptoms that may indicate ongoing exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-10-31T21:49:09.971Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b22178f764e1f470a2d
Added to database: 10/15/2025, 1:01:22 PM
Last enriched: 10/15/2025, 1:15:51 PM
Last updated: 11/26/2025, 1:56:21 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9191: CWE-502 Deserialization of Untrusted Data in favethemes Houzez
MediumCVE-2025-9163: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in favethemes Houzez
MediumCVE-2025-13674: CWE-824: Access of Uninitialized Pointer in Wireshark Foundation Wireshark
MediumCVE-2025-59390: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Apache Software Foundation Apache Druid
UnknownCVE-2025-62728: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Apache Software Foundation Apache Hive
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.