Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5chr-fjjv-38qv

Опубликовано: 20 мар. 2025
Источник: github
Github: Прошло ревью
CVSS3: 5.3

Описание

langchain-core allows unauthorized users to read arbitrary files from the host file system

A vulnerability in langchain-core versions >=0.1.17,<0.1.53, >=0.2.0,<0.2.43, and >=0.3.0,<0.3.15 allows unauthorized users to read arbitrary files from the host file system. The issue arises from the ability to create langchain_core.prompts.ImagePromptTemplate's (and by extension langchain_core.prompts.ChatPromptTemplate's) with input variables that can read any user-specified path from the server file system. If the outputs of these prompt templates are exposed to the user, either directly or through downstream model outputs, it can lead to the exposure of sensitive information.

Пакеты

Наименование

langchain-core

pip
Затронутые версииВерсия исправления

>= 0.1.17, < 0.1.53

0.1.53

Наименование

langchain-core

pip
Затронутые версииВерсия исправления

>= 0.2.0, < 0.2.43

0.2.43

Наименование

langchain-core

pip
Затронутые версииВерсия исправления

>= 0.3.0, < 0.3.15

0.3.15

EPSS

Процентиль: 27%
0.00096
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-497

Связанные уязвимости

CVSS3: 5.3
redhat
11 месяцев назад

A vulnerability in langchain-core versions >=0.1.17,<0.1.53, >=0.2.0,<0.2.43, and >=0.3.0,<0.3.15 allows unauthorized users to read arbitrary files from the host file system. The issue arises from the ability to create langchain_core.prompts.ImagePromptTemplate's (and by extension langchain_core.prompts.ChatPromptTemplate's) with input variables that can read any user-specified path from the server file system. If the outputs of these prompt templates are exposed to the user, either directly or through downstream model outputs, it can lead to the exposure of sensitive information.

CVSS3: 5.3
nvd
11 месяцев назад

A vulnerability in langchain-core versions >=0.1.17,<0.1.53, >=0.2.0,<0.2.43, and >=0.3.0,<0.3.15 allows unauthorized users to read arbitrary files from the host file system. The issue arises from the ability to create langchain_core.prompts.ImagePromptTemplate's (and by extension langchain_core.prompts.ChatPromptTemplate's) with input variables that can read any user-specified path from the server file system. If the outputs of these prompt templates are exposed to the user, either directly or through downstream model outputs, it can lead to the exposure of sensitive information.

EPSS

Процентиль: 27%
0.00096
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-497