Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-36421— GHSL-2023-234: Flowise Cors Misconfiguration in packages/server/src/index.ts

CVSS 7.5 · High EPSS 1.63% · P82
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-36421

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
GHSL-2023-234: Flowise Cors Misconfiguration in packages/server/src/index.ts
Source: NVD (National Vulnerability Database)
Vulnerability Description
Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, A CORS misconfiguration sets the Access-Control-Allow-Origin header to all, allowing arbitrary origins to connect to the website. In the default configuration (unauthenticated), arbitrary origins may be able to make requests to Flowise, stealing information from the user. This CORS misconfiguration may be chained with the path injection to allow an attacker attackers without access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
源验证错误
Source: NVD (National Vulnerability Database)
Vulnerability Title
Flowise 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Flowise是一个用于轻松构建 LLM 应用程序的工具。 Flowise 1.4.3 版本存在安全漏洞,该漏洞源于跨域资源共享配置错误得将 Access-Control-Allow-Origin 标头设置为全部,允许任意来源连接到网站。在默认配置(未经身份验证)下,任意来源可能能够向 Flowise 发出请求,窃取用户信息。此 CORS 配置错误可能与路径注入相结合,允许攻击者(无需访问 Flowise)从 Flowise 服务器读取任意文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
FlowiseAIFlowise <= 1.4.3 -

II. Public POCs for CVE-2024-36421

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-36421

登录查看更多情报信息。

Same Patch Batch · FlowiseAI · 2024-07-01 · 6 CVEs total

CVE-2024-364207.5 HIGHGHSL-2023-232: Flowise Path Injection at /api/v1/openai-assistants-file
CVE-2024-371466.1 MEDIUMGHSL-2023-248: Flowise xss in /api/v1/credentials/id
CVE-2024-371456.1 MEDIUMGHSL-2023-247: Flowise xss in /api/v1/chatflows-streaming/id
CVE-2024-364236.1 MEDIUMGHSL-2023-246: Flowise xss in /api/v1/public-chatflows/id
CVE-2024-364226.1 MEDIUMGHSL-2023-245: Flowise xss in api/v1/chatflows/id

IV. Related Vulnerabilities

V. Comments for CVE-2024-36421

No comments yet


Leave a comment