Логотип exploitDog
bind:CVE-2024-7774
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-7774

Количество 2

Количество 2

nvd логотип

CVE-2024-7774

больше 1 года назад

A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langchainjs version 0.2.5. This vulnerability allows attackers to save files anywhere in the filesystem, overwrite existing text files, read `.txt` files, and delete files. The vulnerability is exploited through the `setFileContent`, `getParsedFile`, and `mdelete` methods, which do not properly sanitize user input.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-hc5w-c9f8-9cc4

больше 1 года назад

Langchain Path Traversal vulnerability

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-7774

A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langchainjs version 0.2.5. This vulnerability allows attackers to save files anywhere in the filesystem, overwrite existing text files, read `.txt` files, and delete files. The vulnerability is exploited through the `setFileContent`, `getParsedFile`, and `mdelete` methods, which do not properly sanitize user input.

CVSS3: 9.1
0%
Низкий
больше 1 года назад
github логотип
GHSA-hc5w-c9f8-9cc4

Langchain Path Traversal vulnerability

CVSS3: 6.5
0%
Низкий
больше 1 года назад

Уязвимостей на страницу