Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-10907: CWE-835 Loop with Unreachable Exit Condition in lm-sys lm-sys/fastchat

0
High
VulnerabilityCVE-2024-10907cvecve-2024-10907cwe-835
Published: Thu Mar 20 2025 (03/20/2025, 10:10:13 UTC)
Source: CVE Database V5
Vendor/Project: lm-sys
Product: lm-sys/fastchat

Description

In lm-sys/fastchat Release v0.2.36, the server fails to handle excessive characters appended to the end of multipart boundaries. This flaw can be exploited by sending malformed multipart requests with arbitrary characters at the end of the boundary. Each extra character is processed in an infinite loop, leading to excessive resource consumption and a complete denial of service (DoS) for all users. The vulnerability is unauthenticated, meaning no user login or interaction is required for an attacker to exploit this issue.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:19:10 UTC

Technical Analysis

CVE-2024-10907 affects the lm-sys/fastchat server, specifically in how it processes multipart HTTP requests. The vulnerability arises from improper handling of multipart boundaries when arbitrary characters are appended to the end of these boundaries. Instead of rejecting or safely processing such malformed input, the server enters an infinite loop for each extra character appended. This loop consumes excessive CPU and memory resources, leading to a denial of service condition that can render the server unresponsive to legitimate users. The vulnerability is classified under CWE-835 (Loop with Unreachable Exit Condition), indicating a logic flaw in loop termination conditions. Exploitation requires no authentication or user interaction, allowing remote attackers to trigger the infinite loop simply by sending crafted HTTP multipart requests. The CVSS v3.0 base score is 7.5 (high), reflecting the ease of exploitation and the severe impact on availability. The affected versions are unspecified but include at least v0.2.36. No patches or fixes have been linked yet, and no exploits are known in the wild as of the publication date. This vulnerability primarily threatens service availability by enabling denial of service attacks through resource exhaustion.

Potential Impact

For European organizations deploying lm-sys/fastchat, this vulnerability could lead to significant service outages due to denial of service attacks. Critical services relying on fastchat for communication or AI-driven interactions may become unavailable, impacting business continuity and user experience. The unauthenticated nature of the exploit means attackers can launch DoS attacks without needing credentials or insider access, increasing the attack surface. Organizations in sectors such as finance, healthcare, and government that depend on real-time chat or AI services could face operational disruptions and potential reputational damage. Additionally, resource exhaustion might indirectly affect other hosted services on the same infrastructure, amplifying the impact. Given the lack of known exploits, the threat is currently theoretical but could escalate rapidly once exploit code becomes available. European data centers hosting these services might experience increased load and potential cascading failures if targeted at scale.

Mitigation Recommendations

Immediate mitigation should focus on implementing input validation and rate limiting at the network or application layer to detect and block malformed multipart requests with excessive boundary characters. Deploying web application firewalls (WAFs) with custom rules to identify and drop suspicious multipart requests can reduce exposure. Organizations should monitor server resource usage closely to detect abnormal spikes indicative of exploitation attempts. If possible, isolate lm-sys/fastchat instances in dedicated environments to contain potential DoS impacts. Until an official patch is released, consider disabling or restricting multipart request handling if feasible. Engage with the vendor or open-source maintainers to obtain updates or patches addressing this issue. Regularly update intrusion detection systems (IDS) signatures to include detection for this vulnerability. Finally, develop incident response plans specifically for DoS scenarios targeting this vulnerability to minimize downtime.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-11-05T22:25:53.642Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b23178f764e1f470a63

Added to database: 10/15/2025, 1:01:23 PM

Last enriched: 10/15/2025, 1:19:10 PM

Last updated: 12/1/2025, 9:30:41 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats