CVE-2023-36258

An issue in LangChain before 0.0.236 allows an attacker to execute arbitrary code because Python code with os.system, exec, or eval can be used.
References
Link Resource
https://github.com/hwchase17/langchain/issues/5872 Exploit Issue Tracking Mitigation
Configurations

Configuration 1 (hide)

cpe:2.3:a:langchain:langchain:0.0.199:*:*:*:*:*:*:*

History

26 Feb 2024, 16:27

Type Values Removed Values Added
Summary An issue in langchain v.0.0.199 allows an attacker to execute arbitrary code via the PALChain in the python exec method. An issue in LangChain before 0.0.236 allows an attacker to execute arbitrary code because Python code with os.system, exec, or eval can be used.

10 Jul 2023, 17:01

Type Values Removed Values Added
First Time Langchain langchain
Langchain
References (MISC) https://github.com/hwchase17/langchain/issues/5872 - (MISC) https://github.com/hwchase17/langchain/issues/5872 - Exploit, Issue Tracking, Mitigation
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:langchain:langchain:0.0.199:*:*:*:*:*:*:*

03 Jul 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-03 21:15

Updated : 2024-02-28 20:13


NVD link : CVE-2023-36258

Mitre link : CVE-2023-36258

CVE.ORG link : CVE-2023-36258


JSON object : View

Products Affected

langchain

  • langchain