Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cvg9-334x-w586

Опубликовано: 20 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

A vulnerability in langgenius/dify v0.10.1 allows an attacker to take over any account, including administrator accounts, by exploiting a weak pseudo-random number generator (PRNG) used for generating password reset codes. The application uses random.randint for this purpose, which is not suitable for cryptographic use and can be cracked. An attacker with access to workflow tools can extract the PRNG output and predict future password reset codes, leading to a complete compromise of the application.

A vulnerability in langgenius/dify v0.10.1 allows an attacker to take over any account, including administrator accounts, by exploiting a weak pseudo-random number generator (PRNG) used for generating password reset codes. The application uses random.randint for this purpose, which is not suitable for cryptographic use and can be cracked. An attacker with access to workflow tools can extract the PRNG output and predict future password reset codes, leading to a complete compromise of the application.

EPSS

Процентиль: 32%
0.00127
Низкий

7.5 High

CVSS3

Дефекты

CWE-338

Связанные уязвимости

CVSS3: 8.8
nvd
11 месяцев назад

A vulnerability in langgenius/dify v0.10.1 allows an attacker to take over any account, including administrator accounts, by exploiting a weak pseudo-random number generator (PRNG) used for generating password reset codes. The application uses `random.randint` for this purpose, which is not suitable for cryptographic use and can be cracked. An attacker with access to workflow tools can extract the PRNG output and predict future password reset codes, leading to a complete compromise of the application.

EPSS

Процентиль: 32%
0.00127
Низкий

7.5 High

CVSS3

Дефекты

CWE-338