Описание
A vulnerability classified as problematic was found in Langflow up to 1.0.18. Affected by this vulnerability is an unknown functionality of the file \src\backend\base\langflow\interface\utils.py of the component HTTP POST Request Handler. The manipulation of the argument remaining_text leads to inefficient regular expression complexity. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Ссылки
- ExploitThird Party Advisory
- Permissions RequiredVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия до 1.0.18 (включая)
cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*
EPSS
Процентиль: 38%
0.0017
Низкий
3.5 Low
CVSS3
6.5 Medium
CVSS3
2.3 Low
CVSS2
Дефекты
CWE-1333
Связанные уязвимости
CVSS3: 3.5
github
больше 1 года назад
Inefficient Regular Expression Complexity in langflow
EPSS
Процентиль: 38%
0.0017
Низкий
3.5 Low
CVSS3
6.5 Medium
CVSS3
2.3 Low
CVSS2
Дефекты
CWE-1333