First published: Thu Mar 20 2025(Updated: )
A vulnerability in infiniflow/ragflow versions v0.12.0 allows for remote code execution. The RPC server in RagFlow uses a hard-coded AuthKey 'authkey=b'infiniflow-token4kevinhu'' which can be easily fetched by attackers to join the group communication without restrictions. Additionally, the server processes incoming data using pickle deserialization via `pickle.loads()` on `connection.recv()`, making it vulnerable to remote code execution. This issue is fixed in version 0.14.0.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
RAGFlow | >=0.12.0<0.14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12433 has a high severity due to its potential for remote code execution.
CVE-2024-12433 can be exploited by attackers who fetch the hard-coded AuthKey to gain unauthorized access.
CVE-2024-12433 affects RAGFlow versions from 0.12.0 to just below 0.14.0.
To fix CVE-2024-12433, update RAGFlow to the latest version that does not include the hard-coded AuthKey.
CVE-2024-12433 is not classified as a zero-day as it has been publicly disclosed.