Description
Dify version 1.14.1 and prior contain an authorization bypass vulnerability in the file preview endpoint that allows any authenticated user to read up to 3,000 characters of any uploaded document across all tenants and workspaces using only the file's UUID. Attackers can access the /console/api/files/{file_id}/preview endpoint with an intercepted file UUID to extract sensitive content from documents without ownership or workspace permission verification. NOTE: Dify Cloud allows unauthenticated free self-registration, making account creation trivially accessible to any attacker.
Problem types
Authorization Bypass Through User-Controlled Key
Product status
Any version
Credits
Ido Shani and Gal Zaban of Zafran Security
References
huntr.com/bounties/d50a0240-7951-4939-b989-9bded66c7682
github.com/langgenius/dify/pull/35797
www.vulncheck.com/...zation-bypass-via-file-preview-endpoint