langgenius/dify version 0.9.1 contains a Server-Side Request Forgery (SSRF) vulnerability. The vulnerability exists due to improper handling of the api_endpoint parameter, allowing an attacker to make direct requests to internal network services. This can lead to unauthorized access to internal servers and potentially expose sensitive information, including access to the AWS metadata endpoint.
References
Configurations
History
01 Apr 2025, 20:35
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:a:dify:dify:0.9.1:*:*:*:*:*:*:* | |
References | () https://huntr.com/bounties/f3042029-5d4e-41c6-850d-bbe02fae6592 - Exploit | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
First Time |
Dify
Dify dify |
20 Mar 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/f3042029-5d4e-41c6-850d-bbe02fae6592 - |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-04-01 20:35
NVD link : CVE-2024-11822
Mitre link : CVE-2024-11822
CVE.ORG link : CVE-2024-11822
JSON object : View
Products Affected
dify
- dify
CWE
CWE-918
Server-Side Request Forgery (SSRF)