Lucene search

K
githubGitHub Advisory DatabaseGHSA-FJ32-Q626-PJJC
HistoryAug 15, 2023 - 6:31 p.m.

LangChain vulnerable to arbitrary code execution

2023-08-1518:31:32
CWE-94
GitHub Advisory Database
github.com
6
langchain
remote attack
arbitrary code execution
software vulnerability

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

73.3%

An issue in LangChain v.0.0.231 allows a remote attacker to execute arbitrary code via the prompt parameter.

Affected configurations

Vulners
Node
langchainlangchainRange0.0.231
CPENameOperatorVersion
langchainle0.0.231

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

73.3%

Related for GHSA-FJ32-Q626-PJJC