First published: Thu Mar 20 2025(Updated: )
A Denial of Service (DoS) vulnerability in the multipart request boundary processing mechanism of eosphoros-ai/db-gpt v0.6.0 allows unauthenticated attackers to cause excessive resource consumption. The server fails to handle excessive characters appended to the end of multipart boundaries, leading to an infinite loop and complete denial of service for all users. This vulnerability affects all endpoints processing multipart/form-data requests.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
eosphoros-ai db-gpt | ||
pip/dbgpt | <=0.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10829 is classified as a Denial of Service (DoS) vulnerability.
To mitigate CVE-2024-10829, upgrade the eosphoros-ai/db-gpt package to a version higher than 0.6.0.
CVE-2024-10829 occurs due to improper handling of excessive characters in multipart request boundary processing.
CVE-2024-10829 affects users of eosphoros-ai/db-gpt versions up to and including 0.6.0.
The potential impacts of CVE-2024-10829 include excessive resource consumption leading to Denial of Service.