We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-10252

Code Injection in langgenius/dify



Description

A vulnerability in langgenius/dify versions <=v0.9.1 allows for code injection via internal SSRF requests in the Dify sandbox service. This vulnerability enables an attacker to execute arbitrary Python code with root privileges within the sandbox environment, potentially leading to the deletion of the entire sandbox service and causing irreversible damage.

Reserved 2024-10-22 | Published 2025-03-20 | Updated 2025-03-20 | Assigner @huntr_ai


HIGH: 8.8CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-94 Improper Control of Generation of Code

Product status

Any version before 0.2.10
affected

References

huntr.com/bounties/62c6c958-96cb-426c-aebc-c41f06b9d7b0

github.com/...ommit/4ac99ffe0e1c9f4d7c523908e91bbc7739e0a8d4

cve.org (CVE-2024-10252)

nvd.nist.gov (CVE-2024-10252)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-10252

Support options

Helpdesk Chat, Email, Knowledgebase