Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-10955: CWE-1333 Inefficient Regular Expression Complexity in gaizhenbiao gaizhenbiao/chuanhuchatgpt

0
Medium
VulnerabilityCVE-2024-10955cvecve-2024-10955cwe-1333
Published: Thu Mar 20 2025 (03/20/2025, 10:11:01 UTC)
Source: CVE Database V5
Vendor/Project: gaizhenbiao
Product: gaizhenbiao/chuanhuchatgpt

Description

A Regular Expression Denial of Service (ReDoS) vulnerability exists in gaizhenbiao/chuanhuchatgpt, as of commit 20b2e02. The server uses the regex pattern `r'<[^>]+>'` to parse user input. In Python's default regex engine, this pattern can take polynomial time to match certain crafted inputs. An attacker can exploit this by uploading a malicious JSON payload, causing the server to consume 100% CPU for an extended period. This can lead to a Denial of Service (DoS) condition, potentially affecting the entire server.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:20:09 UTC

Technical Analysis

CVE-2024-10955 is a vulnerability classified under CWE-1333, involving inefficient regular expression complexity in the gaizhenbiao/chuanhuchatgpt project. The affected software uses the regex pattern `<[^>]+>` to parse user input, which in Python's default regex engine can exhibit polynomial time complexity for certain crafted inputs. This inefficiency can be exploited by an attacker who uploads a malicious JSON payload containing strings designed to trigger catastrophic backtracking in the regex engine. As a result, the server's CPU usage spikes to 100%, causing a Denial of Service (DoS) by exhausting processing resources and potentially making the service unavailable. The vulnerability requires network access and low privileges but does not need user interaction, increasing its risk profile. The CVSS 3.0 score is 6.5, reflecting medium severity due to the impact on availability and ease of exploitation. No patches or fixes are currently linked, and no known exploits have been reported in the wild. This vulnerability highlights the risks of using inefficient regex patterns in input parsing, especially in network-facing services. Organizations relying on gaizhenbiao/chuanhuchatgpt or similar Python-based regex parsing should review their regex usage and consider mitigations to prevent DoS attacks.

Potential Impact

For European organizations, the primary impact of CVE-2024-10955 is service disruption due to Denial of Service attacks. Organizations running gaizhenbiao/chuanhuchatgpt or similar Python-based applications that parse user input with vulnerable regex patterns may experience server outages or degraded performance. This can affect availability of critical services, leading to operational downtime, loss of productivity, and potential reputational damage. Sectors with high reliance on chatbots or AI-driven communication tools, such as customer support, healthcare, and finance, could be particularly affected. Additionally, the increased CPU usage could lead to higher operational costs and strain on infrastructure. While confidentiality and integrity are not directly impacted, the availability disruption can indirectly affect business continuity and compliance with regulations such as GDPR if services become unavailable. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities once disclosed.

Mitigation Recommendations

1. Replace the vulnerable regex pattern `<[^>]+>` with a more efficient and safe alternative that avoids catastrophic backtracking, such as using non-greedy quantifiers or specialized parsers for HTML/XML content. 2. Implement strict input validation and sanitization to reject or limit inputs that could trigger regex inefficiencies. 3. Apply resource limits on CPU usage and execution time for regex operations to prevent excessive resource consumption. 4. Monitor server CPU usage and set up alerts for unusual spikes that could indicate exploitation attempts. 5. If possible, update or patch the gaizhenbiao/chuanhuchatgpt project once a fix is released by the vendor or community. 6. Consider isolating the vulnerable service in a sandboxed environment to limit impact. 7. Conduct regular code reviews focusing on regex usage and performance to identify and remediate similar issues proactively. 8. Employ Web Application Firewalls (WAFs) or Intrusion Detection Systems (IDS) to detect and block malicious payloads targeting regex vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-11-06T22:01:08.107Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b23178f764e1f470a6f

Added to database: 10/15/2025, 1:01:23 PM

Last enriched: 10/15/2025, 1:20:09 PM

Last updated: 10/16/2025, 2:52:08 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats