Vulnerability Description
A privilege escalation vulnerability exists in langgenius/dify version 0.9.1. This vulnerability allows a normal user to modify Orchestrate instructions for a chatbot created by an admin user. The issue arises because the application does not properly enforce access controls on the endpoint /console/api/apps/{chatbot-id}/model-config, allowing unauthorized users to alter chatbot configurations.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Langgenius | Dify | 0.9.1 |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/76d5986d-3882-4ea7-81cb-f00400e5c6b6ExploitThird Party Advisory
FAQ
What is CVE-2024-11821?
CVE-2024-11821 is a vulnerability with a CVSS score of 4.3 (MEDIUM). A privilege escalation vulnerability exists in langgenius/dify version 0.9.1. This vulnerability allows a normal user to modify Orchestrate instructions for a chatbot created by an admin user. The iss...
How severe is CVE-2024-11821?
CVE-2024-11821 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-11821?
Check the references section above for vendor advisories and patch information. Affected products include: Langgenius Dify.