Опубликовано: 22 авг. 2023
Источник: github
Github: Прошло ревью
CVSS4: 9.3
CVSS3: 9.8
Описание
langchain vulnerable to arbitrary code execution
An issue in langchain v.0.0.171 allows a remote attacker to execute arbitrary code via the via the a json file to the load_prompt parameter. This is related to __subclasses__ or a template.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2023-36281
- https://github.com/hwchase17/langchain/issues/4394
- https://github.com/langchain-ai/langchain/pull/10252
- https://github.com/langchain-ai/langchain/commit/22abeb9f6cc555591bf8e92b5e328e43aa07ff6c
- https://aisec.today/LangChain-2e6244a313dd46139c5ef28cbcab9e55
- https://github.com/langchain-ai/langchain/releases/tag/v0.0.312
- https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-151.yaml
Пакеты
Наименование
langchain
pip
Затронутые версииВерсия исправления
< 0.0.312
0.0.312
EPSS
Процентиль: 99%
0.68533
Средний
9.3 Critical
CVSS4
9.8 Critical
CVSS3
CVE ID
Дефекты
CWE-94
Связанные уязвимости
CVSS3: 9.8
nvd
больше 2 лет назад
An issue in langchain v.0.0.171 allows a remote attacker to execute arbitrary code via a JSON file to load_prompt. This is related to __subclasses__ or a template.
EPSS
Процентиль: 99%
0.68533
Средний
9.3 Critical
CVSS4
9.8 Critical
CVSS3
CVE ID
Дефекты
CWE-94