langgenius/dify version 0.10.1 contains a Server-Side Request Forgery (SSRF) vulnerability in the test functionality for the Create Custom Tool option via the REST API `POST /console/api/workspaces/current/tool-provider/api/test/pre`. Attackers can set the `url` in the `servers` dictionary in OpenAI's schema with arbitrary URL targets, allowing them to abuse the victim server's credentials to access unauthorized web resources.
References
Link | Resource |
---|---|
https://huntr.com/bounties/e90e929a-9bc9-46ad-a5e5-1f6f124d0f12 | Exploit Third Party Advisory |
Configurations
History
14 Jul 2025, 18:13
Type | Values Removed | Values Added |
---|---|---|
First Time |
Langgenius dify
Langgenius |
|
Summary |
|
|
CPE | cpe:2.3:a:langgenius:dify:0.10.1:*:*:*:*:node.js:*:* | |
References | () https://huntr.com/bounties/e90e929a-9bc9-46ad-a5e5-1f6f124d0f12 - Exploit, Third Party Advisory |
20 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 10:15
Updated : 2025-07-14 18:13
NVD link : CVE-2024-12775
Mitre link : CVE-2024-12775
CVE.ORG link : CVE-2024-12775
JSON object : View
Products Affected
langgenius
- dify
CWE
CWE-918
Server-Side Request Forgery (SSRF)