Lucene search

K
cve[email protected]CVE-2024-0243
HistoryFeb 26, 2024 - 4:27 p.m.

CVE-2024-0243

2024-02-2616:27:49
CWE-918
web.nvd.nist.gov
58
security
information security
cve-2024-0243
web crawler
html
code injection

3.7 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N

4.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.4%

With the following crawler configuration:

from bs4 import BeautifulSoup as Soup

url = "https://example.com"
loader = RecursiveUrlLoader(
    url=url, max_depth=2, extractor=lambda x: Soup(x, "html.parser").text
)
docs = loader.load()

An attacker in control of the contents of https://example.com could place a malicious HTML file in there with links like “https://example.completely.different/my_file.html” and the crawler would proceed to download that file as well even though prevent_outside=True.

https://github.com/langchain-ai/langchain/blob/bf0b3cc0b5ade1fb95a5b1b6fa260e99064c2e22/libs/community/langchain_community/document_loaders/recursive_url_loader.py#L51-L51

Resolved in https://github.com/langchain-ai/langchain/pull/15559

CNA Affected

[
  {
    "vendor": "langchain-ai",
    "product": "langchain-ai/langchain",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "0.1.0",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  }
]

3.7 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N

4.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.4%