First published: Thu Mar 20 2025(Updated: )
A Server-Side Request Forgery (SSRF) vulnerability exists in infiniflow/ragflow version 0.12.0. The vulnerability is present in the `POST /v1/llm/add_llm` and `POST /v1/conversation/tts` endpoints. Attackers can specify an arbitrary URL as the `api_base` when adding an `OPENAITTS` model, and subsequently access the `tts` REST API endpoint to read contents from the specified URL. This can lead to unauthorized access to internal web resources.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
RAGFlow | ||
RAGFlow | =0.12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-12779 is categorized as high due to its potential for exploitation through Server-Side Request Forgery.
To fix CVE-2024-12779, update the infiniflow/ragflow to a version that has patched the vulnerability.
The affected endpoints for CVE-2024-12779 are POST /v1/llm/add_llm and POST /v1/conversation/tts.
CVE-2024-12779 is classified as a Server-Side Request Forgery (SSRF) vulnerability.
Users of infiniflow/ragflow version 0.12.0 are affected by CVE-2024-12779.