We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-12433

Remote Code Execution in infiniflow/ragflow



Description

A vulnerability in infiniflow/ragflow versions v0.12.0 allows for remote code execution. The RPC server in RagFlow uses a hard-coded AuthKey 'authkey=b'infiniflow-token4kevinhu'' which can be easily fetched by attackers to join the group communication without restrictions. Additionally, the server processes incoming data using pickle deserialization via `pickle.loads()` on `connection.recv()`, making it vulnerable to remote code execution. This issue is fixed in version 0.14.0.

Reserved 2024-12-10 | Published 2025-03-20 | Updated 2025-03-20 | Assigner @huntr_ai


CRITICAL: 9.8CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-502 Deserialization of Untrusted Data

Product status

Any version before 0.14.0
affected

References

huntr.com/bounties/8a1465af-09e4-42af-9e54-0b70e7c87499

github.com/...ommit/49494d4e3c8f06a5e52cf1f7cce9fa03cadcfbf6

cve.org (CVE-2024-12433)

nvd.nist.gov (CVE-2024-12433)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-12433

Support options

Helpdesk Chat, Email, Knowledgebase