A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240628 allows for a Denial of Service (DOS) attack. When uploading a file, if an attacker appends a large number of characters to the end of a multipart boundary, the system will continuously process each character, rendering ChuanhuChatGPT inaccessible. This uncontrolled resource consumption can lead to prolonged unavailability of the service, disrupting operations and causing potential data inaccessibility and loss of productivity.
Metrics
Affected Vendors & Products
References
History
Thu, 14 Nov 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-400 |
Mon, 04 Nov 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gaizhenbiao chuanhuchatgpt
|
|
CPEs | cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:20240628:*:*:*:*:*:*:* | |
Vendors & Products |
Gaizhenbiao chuanhuchatgpt
|
|
Metrics |
cvssV3_1
|
Tue, 29 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gaizhenbiao
Gaizhenbiao gaizhenbiao\/chuanhuchatgpt |
|
Weaknesses | CWE-770 | |
CPEs | cpe:2.3:a:gaizhenbiao:gaizhenbiao\/chuanhuchatgpt:*:*:*:*:*:*:*:* | |
Vendors & Products |
Gaizhenbiao
Gaizhenbiao gaizhenbiao\/chuanhuchatgpt |
|
Metrics |
ssvc
|
Tue, 29 Oct 2024 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240628 allows for a Denial of Service (DOS) attack. When uploading a file, if an attacker appends a large number of characters to the end of a multipart boundary, the system will continuously process each character, rendering ChuanhuChatGPT inaccessible. This uncontrolled resource consumption can lead to prolonged unavailability of the service, disrupting operations and causing potential data inaccessibility and loss of productivity. | |
Title | Denial of Service (DOS) in gaizhenbiao/chuanhuchatgpt | |
Weaknesses | CWE-400 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-01-09T17:13:30.519Z
Reserved: 2024-08-14T17:27:48.115Z
Link: CVE-2024-7807

Updated: 2024-10-29T13:35:55.351Z

Status : Modified
Published: 2024-10-29T13:15:10.360
Modified: 2025-01-09T18:15:29.543
Link: CVE-2024-7807

No data.