Описание
LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution. (A patch is available as of release 0.1.29 of langchain-core.)
Ссылки
- ExploitThird Party Advisory
- ProductThird Party Advisory
- ExploitIssue TrackingPatch
- ExploitThird Party Advisory
- ProductThird Party Advisory
- ExploitIssue TrackingPatch
Уязвимые конфигурации
Конфигурация 1Версия до 0.1.12 (исключая)
cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*
EPSS
Процентиль: 93%
0.1069
Средний
8.1 High
CVSS3
Дефекты
CWE-22
CWE-31
Связанные уязвимости
EPSS
Процентиль: 93%
0.1069
Средний
8.1 High
CVSS3
Дефекты
CWE-22
CWE-31