CVE-2024-10935

7.5 HIGH

📋 TL;DR

CVE-2024-10935 is a denial-of-service vulnerability in automatic1111/stable-diffusion-webui where malformed multipart requests with excessive boundary characters can crash the server. This affects all users of version 1.10.0, allowing unauthenticated attackers to disrupt AI image generation services.

💻 Affected Systems

Products:
  • automatic1111/stable-diffusion-webui
Versions: Version 1.10.0
Operating Systems: All platforms running the webui
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 1.10.0 are vulnerable regardless of configuration. The vulnerability affects the web server component handling multipart requests.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage making the stable-diffusion-webui unavailable to all users, potentially disrupting AI image generation workflows and business operations.

🟠

Likely Case

Service disruption causing downtime for AI image generation, affecting productivity and user experience until service is restored.

🟢

If Mitigated

Minimal impact with proper network controls and monitoring in place to detect and block malicious requests before they reach the vulnerable service.

🌐 Internet-Facing: HIGH - The vulnerability is unauthenticated and can be exploited remotely, making internet-facing instances particularly vulnerable to DoS attacks.
🏢 Internal Only: MEDIUM - While still exploitable, internal instances have reduced attack surface and can be protected by network segmentation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted HTTP requests with malformed multipart boundaries, which is relatively straightforward for attackers with basic HTTP knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.10.1 or later

Vendor Advisory: https://huntr.com/bounties/e6fdc6ed-f38d-4798-b60a-0e47893a81a6

Restart Required: Yes

Instructions:

1. Update stable-diffusion-webui to version 1.10.1 or later using git pull or package manager. 2. Restart the webui service to apply the fix.

🔧 Temporary Workarounds

Network-based request filtering

all

Implement WAF rules or reverse proxy configuration to filter requests with malformed multipart boundaries

Rate limiting

all

Implement rate limiting on multipart endpoints to reduce impact of DoS attempts

🧯 If You Can't Patch

  • Implement network segmentation to isolate the vulnerable service from untrusted networks
  • Deploy a web application firewall (WAF) with rules to detect and block malformed multipart requests

🔍 How to Verify

Check if Vulnerable:

Check the webui version by examining the interface footer or running the webui with --version flag

Check Version:

python launch.py --version

Verify Fix Applied:

Confirm version is 1.10.1 or later and test that malformed multipart requests no longer cause service disruption

📡 Detection & Monitoring

Log Indicators:

  • Multiple 400/500 HTTP errors from malformed requests
  • Server crash logs with multipart parsing errors
  • Unusual request patterns with long boundary strings

Network Indicators:

  • Spike in HTTP POST requests to multipart endpoints
  • Requests with abnormally long boundary parameters in Content-Type headers

SIEM Query:

source="webui.log" AND ("multipart" OR "boundary") AND ("error" OR "crash" OR "400" OR "500")

🔗 References

📤 Share & Export