Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-12450

Опубликовано: 20 мар. 2025
Источник: nvd
CVSS3: 6.5
CVSS3: 9.8
EPSS Низкий

Описание

In infiniflow/ragflow versions 0.12.0, the web_crawl function in document_app.py contains multiple vulnerabilities. The function does not filter URL parameters, allowing attackers to exploit Full Read SSRF by accessing internal network addresses and viewing their content through the generated PDF files. Additionally, the lack of restrictions on the file protocol enables Arbitrary File Read, allowing attackers to read server files. Furthermore, the use of an outdated Chromium headless version with --no-sandbox mode enabled makes the application susceptible to Remote Code Execution (RCE) via known Chromium v8 vulnerabilities. These issues are resolved in version 0.14.0.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:infiniflow:ragflow:0.12.0:*:*:*:*:*:*:*

EPSS

Процентиль: 54%
0.00309
Низкий

6.5 Medium

CVSS3

9.8 Critical

CVSS3

Дефекты

CWE-918
CWE-918

Связанные уязвимости

CVSS3: 6.5
github
11 месяцев назад

In infiniflow/ragflow versions 0.12.0, the `web_crawl` function in `document_app.py` contains multiple vulnerabilities. The function does not filter URL parameters, allowing attackers to exploit Full Read SSRF by accessing internal network addresses and viewing their content through the generated PDF files. Additionally, the lack of restrictions on the file protocol enables Arbitrary File Read, allowing attackers to read server files. Furthermore, the use of an outdated Chromium headless version with --no-sandbox mode enabled makes the application susceptible to Remote Code Execution (RCE) via known Chromium v8 vulnerabilities. These issues are resolved in version 0.14.0.

EPSS

Процентиль: 54%
0.00309
Низкий

6.5 Medium

CVSS3

9.8 Critical

CVSS3

Дефекты

CWE-918
CWE-918