Description
Dify before version 1.14.0 contains an authorization bypass vulnerability that allows authenticated users to read the full contents of files uploaded by other users within the same tenant by supplying an arbitrary file UUID in the files array of a chat-messages request. Attackers can exploit insufficient permission verification in the chat-messages endpoints to access files without ownership validation, bypassing workspace separation and signed URL protections to retrieve sensitive file contents through workflow processing.
Problem types
CWE-639 Authorization Bypass Through User-Controlled Key
Product status
Any version before 1.14.0
Credits
Ido Shani and Gal Zaban of Zafran Security
References
huntr.com/bounties/181136ec-d957-4b75-8ea7-6fa7b8abd01d
github.com/langgenius/dify/releases/tag/1.14.0
huntr.com/bounties/181136ec-d957-4b75-8ea7-6fa7b8abd01d
www.vulncheck.com/...dify-authorization-bypass-via-file-uuid