CVE-2024-12450.yaml
1 info: 2 name: ragflow 3 cve: CVE-2024-12450 4 summary: Multiple vulnerabilities in infiniflow/ragflow versions 0.12.0 5 details: | 6 The `web_crawl` function in `document_app.py` contains multiple vulnerabilities: 7 - Does not filter URL parameters, allowing Full Read SSRF by accessing internal network addresses. 8 - Lack of restrictions on the file protocol enables Arbitrary File Read. 9 - Use of an outdated Chromium headless version with --no-sandbox mode enabled makes the application susceptible to Remote Code Execution (RCE) via known Chromium v8 vulnerabilities. 10 These issues are resolved in version 0.14.0. 11 cvss: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N 12 severity: HIGH 13 security_advise: | 14 1. Upgrade to ragflow>=0.14.0 15 2. Review and restrict URL parameter handling in the `web_crawl` function 16 3. Implement proper file protocol restrictions 17 4. Update Chromium headless to the latest version and disable --no-sandbox mode if possible 18 rule: version >= "0.12.0" && version < "0.14.0" 19 references: 20 - https://nvd.nist.gov/vuln/detail/CVE-2024-12450 21 - https://github.com/infiniflow/ragflow/commit/3faae0b2c2f8a26233ee1442ba04874b3406f6e9 22 - https://huntr.com/bounties/da06360c-87c3-4ba9-be67-29f6eff9d44a