langgenius/dify version 0.10.1 contains a Server-Side Request Forgery (SSRF) vulnerability in the test functionality for the Create Custom Tool option via the REST API `POST /console/api/workspaces/current/tool-provider/api/test/pre`. Attackers can set the `url` in the `servers` dictionary in OpenAI's schema with arbitrary URL targets, allowing them to abuse the victim server's credentials to access unauthorized web resources.
History

Mon, 14 Jul 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Langgenius
Langgenius dify
CPEs cpe:2.3:a:langgenius:dify:0.10.1:*:*:*:*:node.js:*:*
Vendors & Products Langgenius
Langgenius dify

Thu, 20 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 20 Mar 2025 10:15:00 +0000

Type Values Removed Values Added
Description langgenius/dify version 0.10.1 contains a Server-Side Request Forgery (SSRF) vulnerability in the test functionality for the Create Custom Tool option via the REST API `POST /console/api/workspaces/current/tool-provider/api/test/pre`. Attackers can set the `url` in the `servers` dictionary in OpenAI's schema with arbitrary URL targets, allowing them to abuse the victim server's credentials to access unauthorized web resources.
Title SSRF in langgenius/dify
Weaknesses CWE-918
References
Metrics cvssV3_0

{'score': 6.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published: 2025-03-20T10:09:23.407Z

Updated: 2025-03-20T18:55:41.104Z

Reserved: 2024-12-18T22:03:01.428Z

Link: CVE-2024-12775

cve-icon Vulnrichment

Updated: 2025-03-20T17:51:12.379Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-20T10:15:30.117

Modified: 2025-07-14T18:13:49.523

Link: CVE-2024-12775

cve-icon Redhat

No data.