GHSL-2023-234: Flowise Cors Misconfiguration in packages/server/src/index.ts
Description
Flowise is a drag & drop user interface to build a customized large language model flow. In version 1.4.3 of Flowise, A CORS misconfiguration sets the Access-Control-Allow-Origin header to all, allowing arbitrary origins to connect to the website. In the default configuration (unauthenticated), arbitrary origins may be able to make requests to Flowise, stealing information from the user. This CORS misconfiguration may be chained with the path injection to allow an attacker attackers without access to Flowise to read arbitrary files from the Flowise server. As of time of publication, no known patches are available.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
flowisenpm | <= 1.4.3 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-66f2-xxgm-f6xpghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-36421ghsaADVISORY
- securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_FlowiseghsaADVISORY
- github.com/FlowiseAI/Flowise/blob/e93ce07851cdc0fcde12374f301b8070f2043687/packages/server/src/index.tsghsax_refsource_MISCWEB
- securitylab.github.com/advisories/GHSL-2023-232_GHSL-2023-234_Flowise/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.