Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q84m-rmw3-4382

Опубликовано: 26 мар. 2024
Источник: github
Github: Прошло ревью
CVSS3: 5.9

Описание

LangChain's XMLOutputParser vulnerable to XML Entity Expansion

The XMLOutputParser in LangChain uses the etree module from the XML parser in the standard python library which has some XML vulnerabilities; see: https://docs.python.org/3/library/xml.html

This primarily affects users that combine an LLM (or agent) with the XMLOutputParser and expose the component via an endpoint on a web-service.

This would allow a malicious party to attempt to manipulate the LLM to produce a malicious payload for the parser that would compromise the availability of the service.

A successful attack is predicated on:

  1. Usage of XMLOutputParser
  2. Passing of malicious input into the XMLOutputParser either directly or by trying to manipulate an LLM to do so on the users behalf
  3. Exposing the component via a web-service

Пакеты

Наименование

langchain-core

pip
Затронутые версииВерсия исправления

< 0.1.35

0.1.35

EPSS

Процентиль: 29%
0.00103
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-776

Связанные уязвимости

CVSS3: 5.9
nvd
почти 2 года назад

A vulnerability in the langchain-ai/langchain repository allows for a Billion Laughs Attack, a type of XML External Entity (XXE) exploitation. By nesting multiple layers of entities within an XML document, an attacker can cause the XML parser to consume excessive CPU and memory resources, leading to a denial of service (DoS).

EPSS

Процентиль: 29%
0.00103
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-776