LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution. (A patch is available as of release 0.1.29 of langchain-core.)
References
Configurations
No configuration.
History
21 Nov 2024, 09:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/PinkDraconian/PoC-Langchain-RCE/blob/main/README.md - | |
References | () https://github.com/langchain-ai/langchain/blob/f96dd57501131840b713ed7c2e86cbf1ddc2761f/libs/core/langchain_core/utils/loading.py - | |
References | () https://github.com/langchain-ai/langchain/pull/18600 - |
26 Aug 2024, 20:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-31 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
13 Mar 2024, 21:16
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution. (A patch is available as of release 0.1.29 of langchain-core.) | |
References |
|
04 Mar 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-04 00:15
Updated : 2024-11-21 09:05
NVD link : CVE-2024-28088
Mitre link : CVE-2024-28088
CVE.ORG link : CVE-2024-28088
JSON object : View
Products Affected
No product.
CWE
CWE-31
Path Traversal: 'dir\..\..\filename'