Realchar version v0.0.4 is vulnerable to an unauthenticated denial of service (DoS) attack. The vulnerability exists in the file upload request handling, where appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request causes the server to continuously process each character. This leads to excessive resource consumption and renders the service unavailable. The issue is unauthenticated and does not require any user interaction, impacting all users of the service.
History

Thu, 20 Mar 2025 10:15:00 +0000

Type Values Removed Values Added
Description Realchar version v0.0.4 is vulnerable to an unauthenticated denial of service (DoS) attack. The vulnerability exists in the file upload request handling, where appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request causes the server to continuously process each character. This leads to excessive resource consumption and renders the service unavailable. The issue is unauthenticated and does not require any user interaction, impacting all users of the service.
Title Unauthenticated Denial of Service in shaunwei/realchar
Weaknesses CWE-400
References
Metrics cvssV3_0

{'score': 7.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2025-03-20T18:15:32.979Z

Reserved: 2024-10-16T20:32:39.924Z

Link: CVE-2024-10051

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-03-20T10:15:14.490

Modified: 2025-03-20T10:15:14.490

Link: CVE-2024-10051

cve-icon Redhat

No data.