Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x53g-q9xm-rf4m

Опубликовано: 07 июл. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

langgenius/dify versions 1.1.0 to 1.1.2 are vulnerable to unsanitized input in the code node, allowing execution of arbitrary code with full root permissions. The vulnerability arises from the ability to override global functions in JavaScript, such as parseInt, before sandbox security restrictions are imposed. This can lead to unauthorized access to secret keys, internal network servers, and lateral movement within dify.ai. The issue is resolved in version 1.1.3.

langgenius/dify versions 1.1.0 to 1.1.2 are vulnerable to unsanitized input in the code node, allowing execution of arbitrary code with full root permissions. The vulnerability arises from the ability to override global functions in JavaScript, such as parseInt, before sandbox security restrictions are imposed. This can lead to unauthorized access to secret keys, internal network servers, and lateral movement within dify.ai. The issue is resolved in version 1.1.3.

EPSS

Процентиль: 38%
0.00168
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-1100

Связанные уязвимости

CVSS3: 7.2
nvd
7 месяцев назад

langgenius/dify versions 1.1.0 to 1.1.2 are vulnerable to unsanitized input in the code node, allowing execution of arbitrary code with full root permissions. The vulnerability arises from the ability to override global functions in JavaScript, such as parseInt, before sandbox security restrictions are imposed. This can lead to unauthorized access to secret keys, internal network servers, and lateral movement within dify.ai. The issue is resolved in version 1.1.3.

CVSS3: 9.8
fstec
11 месяцев назад

Уязвимость функции parseInt() платформы для разработки приложений dify.ai, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 38%
0.00168
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-1100