{"vulnerability": "CVE-2024-7807", "sightings": [{"uuid": "30076add-32d7-4fd3-afb2-3c046c6589bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7807", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8197", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10650\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: An unauthenticated Denial of Service (DoS) vulnerability was identified in ChuanhuChatGPT version 20240918, which could be exploited by sending large data payloads using a multipart boundary. Although a patch was applied for CVE-2024-7807, the issue can still be exploited by sending data in groups with 10 characters in a line, with multiple lines. This can cause the system to continuously process these characters, resulting in prolonged unavailability of the service. The exploitation now requires low privilege if authentication is enabled due to a version upgrade in Gradio.\n\ud83d\udccf Published: 2025-03-20T10:11:29.258Z\n\ud83d\udccf Modified: 2025-03-20T10:11:29.258Z\n\ud83d\udd17 References:\n1. https://huntr.com/bounties/f820371d-a878-44bf-b1fd-2d837dd58eb4", "creation_timestamp": "2025-03-20T10:19:41.000000Z"}, {"uuid": "aeda1384-ddd2-4c48-9024-19f76f7f0a7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-7807", "type": "seen", "source": "https://t.me/cvedetector/9312", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7807 - \"Gaizhenbiao ChuanhuChatGPT Multipart Boundary Denial of Service Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-7807 \nPublished : Oct. 29, 2024, 1:15 p.m. | 22\u00a0minutes ago \nDescription : A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240628 allows for a Denial of Service (DOS) attack. When uploading a file, if an attacker appends a large number of characters to the end of a multipart boundary, the system will continuously process each character, rendering ChuanhuChatGPT inaccessible. This uncontrolled resource consumption can lead to prolonged unavailability of the service, disrupting operations and causing potential data inaccessibility and loss of productivity. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-29T14:46:34.000000Z"}]}