langgenius/dify version 0.9.1 contains a Server-Side Request Forgery (SSRF) vulnerability. The vulnerability exists due to improper handling of the api_endpoint parameter, allowing an attacker to make direct requests to internal network services. This can lead to unauthorized access to internal servers and potentially expose sensitive information, including access to the AWS metadata endpoint.
Metrics
Affected Vendors & Products
References
History
Thu, 20 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | langgenius/dify version 0.9.1 contains a Server-Side Request Forgery (SSRF) vulnerability. The vulnerability exists due to improper handling of the api_endpoint parameter, allowing an attacker to make direct requests to internal network services. This can lead to unauthorized access to internal servers and potentially expose sensitive information, including access to the AWS metadata endpoint. | |
Title | Server-Side Request Forgery (SSRF) in langgenius/dify | |
Weaknesses | CWE-918 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:09:14.815Z
Updated: 2025-03-20T13:48:41.654Z
Reserved: 2024-11-26T17:27:19.431Z
Link: CVE-2024-11822

Updated: 2025-03-20T13:46:43.013Z

Status : Received
Published: 2025-03-20T10:15:25.677
Modified: 2025-03-20T14:15:18.070
Link: CVE-2024-11822

No data.