CVE-2024-11822

langgenius/dify version 0.9.1 contains a Server-Side Request Forgery (SSRF) vulnerability. The vulnerability exists due to improper handling of the api_endpoint parameter, allowing an attacker to make direct requests to internal network services. This can lead to unauthorized access to internal servers and potentially expose sensitive information, including access to the AWS metadata endpoint.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dify:dify:0.9.1:*:*:*:*:*:*:*

History

01 Apr 2025, 20:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () https://huntr.com/bounties/f3042029-5d4e-41c6-850d-bbe02fae6592 - () https://huntr.com/bounties/f3042029-5d4e-41c6-850d-bbe02fae6592 - Exploit
CPE cpe:2.3:a:dify:dify:0.9.1:*:*:*:*:*:*:*
First Time Dify dify
Dify

20 Mar 2025, 14:15

Type Values Removed Values Added
CWE CWE-918

20 Mar 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-20 10:15

Updated : 2025-04-01 20:35


NVD link : CVE-2024-11822

Mitre link : CVE-2024-11822


JSON object : View

Products Affected

dify

  • dify
CWE

No CWE.