Lucene search

K
LanggeniusDify0.10.1

4 matches found

CVE
CVE
added 2025/03/20 10:15 a.m.59 views

CVE-2024-12775

langgenius/dify version 0.10.1 contains a Server-Side Request Forgery (SSRF) vulnerability in the test functionality for the Create Custom Tool option via the REST API POST /console/api/workspaces/current/tool-provider/api/test/pre. Attackers can set the url in the servers dictionary in OpenAI's sc...

6.5CVSS6.6AI score0.00052EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.50 views

CVE-2025-1796

A vulnerability in langgenius/dify v0.10.1 allows an attacker to take over any account, including administrator accounts, by exploiting a weak pseudo-random number generator (PRNG) used for generating password reset codes. The application uses random.randint for this purpose, which is not suitable ...

8.8CVSS7AI score0.00079EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.36 views

CVE-2024-12039

langgenius/dify version v0.10.1 contains a vulnerability where there are no limits applied to the number of code guess attempts for password reset. This allows an unauthenticated attacker to reset owner, admin, or other user passwords within a few hours by guessing the six-digit code, resulting in ...

8.1CVSS7.3AI score0.00146EPSS
CVE
CVE
added 2025/03/20 10:15 a.m.35 views

CVE-2024-12776

In langgenius/dify v0.10.1, the /forgot-password/resets endpoint does not verify the password reset code, allowing an attacker to reset the password of any user, including administrators. This vulnerability can lead to a complete compromise of the application.

8.1CVSS8.1AI score0.00089EPSS