Опубликовано: 15 авг. 2023
Источник: github
Github: Прошло ревью
CVSS4: 9.3
CVSS3: 9.8
Описание
LangChain vulnerable to arbitrary code execution
An issue in Harrison Chase langchain before version 0.0.236 allows a remote attacker to execute arbitrary code via the from_math_prompt and from_colored_object_prompt functions.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2023-38896
- https://github.com/hwchase17/langchain/issues/5872
- https://github.com/hwchase17/langchain/pull/6003
- https://github.com/langchain-ai/langchain/commit/8ba9835b925473655914f63822775679e03ea137
- https://github.com/langchain-ai/langchain/commit/e294ba475a355feb95003ed8f1a2b99942509a9e
- https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-146.yaml
- https://twitter.com/llm_sec/status/1668711587287375876
Пакеты
Наименование
langchain
pip
Затронутые версииВерсия исправления
< 0.0.236
0.0.236
EPSS
Процентиль: 73%
0.00788
Низкий
9.3 Critical
CVSS4
9.8 Critical
CVSS3
CVE ID
Дефекты
CWE-74
CWE-94
Связанные уязвимости
CVSS3: 9.8
nvd
больше 2 лет назад
An issue in Harrison Chase langchain v.0.0.194 and before allows a remote attacker to execute arbitrary code via the from_math_prompt and from_colored_object_prompt functions.
EPSS
Процентиль: 73%
0.00788
Низкий
9.3 Critical
CVSS4
9.8 Critical
CVSS3
CVE ID
Дефекты
CWE-74
CWE-94