漏洞标题
潜在的不安全直接对象引用(IDOR)漏洞存在于ragflow中
漏洞描述信息
RAGFlow是一款基于深度文档理解的开源RAG(检索增强生成)引擎。经过身份验证的用户可以利用不安全的直接对象引用(IDOR)漏洞,从而可能导致未经授权的跨租户访问(如列出其他租户的用户账户或将用户账户添加到其他租户)。未经授权的跨租户访问包括:列出其他租户的用户(例如,通过GET /<tenant_id>/user/list),将用户账户添加到其他租户(POST /<tenant_id>/user)。此问题尚未修复。建议用户联系项目维护人员协调修复方案。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
漏洞类别
通过用户控制密钥绕过授权机制
漏洞标题
Potential Insecure Direct Object Reference (IDOR) vulnerability in ragflow
漏洞描述信息
RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine based on deep document understanding. An authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability that may lead to unauthorized cross-tenant access (list tenant user accounts, add user account into other tenant). Unauthorized cross-tenant access: list user from other tenant (e.g., via GET /<tenant_id>/user/list), add user account to other tenant (POST /<tenant_id>/user). This issue has not yet been patched. Users are advised to reach out to the project maintainers to coordinate a fix.
CVSS信息
N/A
漏洞类别
通过用户控制密钥绕过授权机制