We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-12450

RCE, Full Read SSRF, and Arbitrary File Read in infiniflow/ragflow



Description

In infiniflow/ragflow versions 0.12.0, the `web_crawl` function in `document_app.py` contains multiple vulnerabilities. The function does not filter URL parameters, allowing attackers to exploit Full Read SSRF by accessing internal network addresses and viewing their content through the generated PDF files. Additionally, the lack of restrictions on the file protocol enables Arbitrary File Read, allowing attackers to read server files. Furthermore, the use of an outdated Chromium headless version with --no-sandbox mode enabled makes the application susceptible to Remote Code Execution (RCE) via known Chromium v8 vulnerabilities. These issues are resolved in version 0.14.0.

Reserved 2024-12-10 | Published 2025-03-20 | Updated 2025-04-04 | Assigner @huntr_ai


MEDIUM: 6.5CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-918 Server-Side Request Forgery (SSRF)

Product status

Any version before 0.14.0
affected

References

huntr.com/bounties/da06360c-87c3-4ba9-be67-29f6eff9d44a

github.com/...ommit/3faae0b2c2f8a26233ee1442ba04874b3406f6e9

cve.org (CVE-2024-12450)

nvd.nist.gov (CVE-2024-12450)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-12450

Support options

Helpdesk Chat, Email, Knowledgebase