Lucene search

K
githubGitHub Advisory DatabaseGHSA-7GFQ-F96F-G85J
HistoryAug 22, 2023 - 9:30 p.m.

langchain vulnerable to arbitrary code execution

2023-08-2221:30:27
CWE-94
GitHub Advisory Database
github.com
13
langchain
arbitrary code execution
remote attacker
json file
load_prompt parameter
vulnerability
software
__subclasses__
template

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.031

Percentile

91.2%

An issue in langchain v.0.0.171 allows a remote attacker to execute arbitrary code via the via the a json file to the load_prompt parameter. This is related to __subclasses__ or a template.

Affected configurations

Vulners
Node
langchainlangchainRange<0.0.312
VendorProductVersionCPE
langchainlangchain*cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.031

Percentile

91.2%