cve/2024/CVE-2024-10252.md

18 lines
886 B
Markdown
Raw Permalink Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-10252](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10252)
![](https://img.shields.io/static/v1?label=Product&message=langgenius%2Fdify&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%20Improper%20Control%20of%20Generation%20of%20Code&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
A vulnerability in langgenius/dify versions <=v0.9.1 allows for code injection via internal SSRF requests in the Dify sandbox service. This vulnerability enables an attacker to execute arbitrary Python code with root privileges within the sandbox environment, potentially leading to the deletion of the entire sandbox service and causing irreversible damage.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ox01024/ox01024