漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Admin account takeover through weak Pseudo-Random number generator used in generating password reset codes in langgenius/dify
Vulnerability Description
A vulnerability in langgenius/dify v0.10.1 allows an attacker to take over any account, including administrator accounts, by exploiting a weak pseudo-random number generator (PRNG) used for generating password reset codes. The application uses `random.randint` for this purpose, which is not suitable for cryptographic use and can be cracked. An attacker with access to workflow tools can extract the PRNG output and predict future password reset codes, leading to a complete compromise of the application.
CVSS Information
N/A
Vulnerability Type
使用具有密码学弱点缺陷的PRNG
Vulnerability Title
dify 安全特征问题漏洞
Vulnerability Description
dify是LangGenius开源的一个开源的 LLM 应用程序开发平台。 dify v0.10.1版本存在安全特征问题漏洞,该漏洞源于弱伪随机数生成器可能导致账户接管。
CVSS Information
N/A
Vulnerability Type
N/A