Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8028: CWE-770 Allocation of Resources Without Limits or Throttling in danswer-ai danswer-ai/danswer

0
High
VulnerabilityCVE-2024-8028cvecve-2024-8028cwe-770
Published: Thu Mar 20 2025 (03/20/2025, 10:09:52 UTC)
Source: CVE Database V5
Vendor/Project: danswer-ai
Product: danswer-ai/danswer

Description

A vulnerability in danswer-ai/danswer v0.3.94 allows an attacker to cause a Denial of Service (DoS) by uploading a file with a malformed multipart boundary. By appending a large number of characters to the end of the multipart boundary, the server continuously processes each character, rendering the application inaccessible. This issue can be exploited by sending a single crafted request, affecting all users on the server.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:21:59 UTC

Technical Analysis

CVE-2024-8028 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the danswer-ai/danswer application, specifically version 0.3.94. The flaw arises from improper handling of multipart file upload boundaries. An attacker can craft a multipart boundary string appended with an excessively large number of characters, which causes the server to enter a resource-intensive processing loop. This leads to a Denial of Service (DoS) condition by exhausting server CPU and memory resources, rendering the application inaccessible to legitimate users. The attack vector is network-based, requiring no authentication or user interaction, making exploitation straightforward. The vulnerability impacts availability only, with no direct compromise of confidentiality or integrity. Although no public exploits have been reported, the CVSS score of 7.5 (high) reflects the ease of exploitation and significant impact on service availability. The vulnerability affects all unspecified versions of danswer-ai/danswer, and no official patches have been linked yet. The root cause is the lack of limits or throttling on resource allocation when processing multipart boundaries, a common vector for resource exhaustion attacks.

Potential Impact

For European organizations deploying danswer-ai/danswer, this vulnerability poses a significant risk of service disruption through Denial of Service attacks. The unavailability of the application can impact business operations, especially for companies relying on AI-driven tools for data analysis, customer interaction, or internal workflows. The attack requires no authentication, increasing the risk of widespread exploitation by external threat actors. Given the increasing adoption of AI and developer tools in Europe, particularly in technology hubs and industries such as finance, manufacturing, and research, the potential impact includes operational downtime, loss of productivity, and reputational damage. Additionally, organizations providing AI services to customers may face compliance and contractual issues if service levels are not maintained. The lack of known exploits currently limits immediate risk but does not diminish the urgency for mitigation due to the vulnerability's simplicity and high impact.

Mitigation Recommendations

To mitigate CVE-2024-8028, organizations should implement the following specific measures: 1) Apply any available patches or updates from the danswer-ai project as soon as they are released. 2) In the absence of patches, configure web servers and application frameworks to enforce strict limits on multipart boundary lengths and overall request size to prevent resource exhaustion. 3) Deploy Web Application Firewalls (WAFs) with custom rules to detect and block multipart requests with abnormally long boundaries or malformed headers. 4) Implement rate limiting and request throttling to reduce the impact of repeated malicious requests from a single source. 5) Monitor application logs and network traffic for unusual multipart upload patterns indicative of exploitation attempts. 6) Consider isolating the vulnerable service behind reverse proxies that can perform additional validation and filtering. 7) Educate development and security teams about secure handling of multipart data to prevent similar vulnerabilities in future releases.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-08-20T19:29:14.357Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b2c178f764e1f470deb

Added to database: 10/15/2025, 1:01:32 PM

Last enriched: 10/15/2025, 1:21:59 PM

Last updated: 11/26/2025, 12:27:40 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats