A Server-Side Request Forgery (SSRF) vulnerability was identified in langgenius/dify version 0.10.2. The vulnerability occurs in the 'Create Knowledge' section when uploading DOCX files. If an external relationship exists in the DOCX file, the reltype value is requested as a URL using the 'requests' module instead of the 'ssrf_proxy', leading to an SSRF vulnerability. This issue was fixed in version 0.11.0.
Metrics
Affected Vendors & Products
References
History
Thu, 20 Mar 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Server-Side Request Forgery (SSRF) vulnerability was identified in langgenius/dify version 0.10.2. The vulnerability occurs in the 'Create Knowledge' section when uploading DOCX files. If an external relationship exists in the DOCX file, the reltype value is requested as a URL using the 'requests' module instead of the 'ssrf_proxy', leading to an SSRF vulnerability. This issue was fixed in version 0.11.0. | |
Title | Server-Side Request Forgery (SSRF) in langgenius/dify | |
Weaknesses | CWE-918 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-03-20T10:11:38.385Z
Updated: 2025-03-20T18:05:10.075Z
Reserved: 2025-01-02T23:42:51.957Z
Link: CVE-2025-0184

Updated: 2025-03-20T18:05:04.196Z

Status : Received
Published: 2025-03-20T10:15:51.173
Modified: 2025-03-20T10:15:51.173
Link: CVE-2025-0184

No data.