Description
Dify version 1.14.1 and prior contains an authorization bypass vulnerability that allows authenticated editor users to set and enable trace configurations for any application regardless of tenant ownership. Attackers can exploit missing tenant ownership checks in the trace configuration endpoints to redirect all messages and responses from victim applications to attacker-controlled LLM trace providers. NOTE: Dify Cloud allows unauthenticated free self-registration, making account creation trivially accessible to any attacker.
Problem types
Authorization Bypass Through User-Controlled Key
Product status
Any version
Credits
Ido Shani and Gal Zaban of Zafran Security
References
huntr.com/bounties/a43076b2-fbc8-4750-9647-89a036b52f52
github.com/langgenius/dify/pull/35793
www.vulncheck.com/...ypass-via-trace-configuration-endpoints