CVE-2024-11173

6.5 MEDIUM

📋 TL;DR

An unhandled exception vulnerability in LibreChat allows attackers to crash the server, causing denial of service. Attackers can exploit this by sending malformed input to specific API endpoints. While authentication is required, open registration enables unauthenticated attackers to create accounts and perform the attack.

💻 Affected Systems

Products:
  • LibreChat
Versions: All versions before 0.7.6, specifically including git commit 600d217
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Open registration must be enabled for unauthenticated exploitation. Systems with registration disabled still vulnerable to authenticated attacks.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption making LibreChat unavailable to all users, potentially requiring manual server restart and causing extended downtime.

🟠

Likely Case

Service crashes requiring restart, causing temporary unavailability and potential data loss for active sessions.

🟢

If Mitigated

Server remains stable with proper input validation and exception handling in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires creating an account if open registration is enabled, then sending malformed requests to vulnerable endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.7.6

Vendor Advisory: https://github.com/danny-avila/librechat/commit/95a212534f1c5991bd1231a34ac3668b4b592cc3

Restart Required: Yes

Instructions:

1. Update LibreChat to version 0.7.6 or later. 2. Restart the LibreChat service. 3. Verify the fix by checking the version and testing API endpoints.

🔧 Temporary Workarounds

Disable Open Registration

all

Prevents unauthenticated attackers from creating accounts to exploit the vulnerability

Edit LibreChat configuration to disable open registration

Implement Input Validation

all

Add input validation at the web application firewall or reverse proxy level

Configure WAF rules to filter malformed API requests

🧯 If You Can't Patch

  • Disable open registration to prevent unauthenticated exploitation
  • Implement rate limiting on API endpoints to reduce attack surface

🔍 How to Verify

Check if Vulnerable:

Check if LibreChat version is below 0.7.6 by examining the version file or running the version check command

Check Version:

Check package.json or version file in LibreChat installation directory

Verify Fix Applied:

Confirm version is 0.7.6 or higher and test API endpoints with malformed input to ensure proper error handling

📡 Detection & Monitoring

Log Indicators:

  • Unhandled exception errors in server logs
  • Server crash/restart events
  • Multiple failed API requests with malformed input

Network Indicators:

  • Unusual patterns of API requests to vulnerable endpoints
  • Sudden drop in service availability

SIEM Query:

source="librechat.log" AND ("unhandled exception" OR "crash" OR "500 error")

🔗 References

📤 Share & Export