CVE-2024-10935
📋 TL;DR
CVE-2024-10935 is a denial-of-service vulnerability in automatic1111/stable-diffusion-webui where malformed multipart requests with excessive boundary characters can crash the server. This affects all users of version 1.10.0, allowing unauthenticated attackers to disrupt AI image generation services.
💻 Affected Systems
- automatic1111/stable-diffusion-webui
📦 What is this software?
Stable Diffusion Webui by Automatic1111
⚠️ Risk & Real-World Impact
Worst Case
Complete service outage making the stable-diffusion-webui unavailable to all users, potentially disrupting AI image generation workflows and business operations.
Likely Case
Service disruption causing downtime for AI image generation, affecting productivity and user experience until service is restored.
If Mitigated
Minimal impact with proper network controls and monitoring in place to detect and block malicious requests before they reach the vulnerable service.
🎯 Exploit Status
Exploitation requires sending specially crafted HTTP requests with malformed multipart boundaries, which is relatively straightforward for attackers with basic HTTP knowledge.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 1.10.1 or later
Vendor Advisory: https://huntr.com/bounties/e6fdc6ed-f38d-4798-b60a-0e47893a81a6
Restart Required: Yes
Instructions:
1. Update stable-diffusion-webui to version 1.10.1 or later using git pull or package manager. 2. Restart the webui service to apply the fix.
🔧 Temporary Workarounds
Network-based request filtering
allImplement WAF rules or reverse proxy configuration to filter requests with malformed multipart boundaries
Rate limiting
allImplement rate limiting on multipart endpoints to reduce impact of DoS attempts
🧯 If You Can't Patch
- Implement network segmentation to isolate the vulnerable service from untrusted networks
- Deploy a web application firewall (WAF) with rules to detect and block malformed multipart requests
🔍 How to Verify
Check if Vulnerable:
Check the webui version by examining the interface footer or running the webui with --version flag
Check Version:
python launch.py --version
Verify Fix Applied:
Confirm version is 1.10.1 or later and test that malformed multipart requests no longer cause service disruption
📡 Detection & Monitoring
Log Indicators:
- Multiple 400/500 HTTP errors from malformed requests
- Server crash logs with multipart parsing errors
- Unusual request patterns with long boundary strings
Network Indicators:
- Spike in HTTP POST requests to multipart endpoints
- Requests with abnormally long boundary parameters in Content-Type headers
SIEM Query:
source="webui.log" AND ("multipart" OR "boundary") AND ("error" OR "crash" OR "400" OR "500")