Lucene search

K
githubGitHub Advisory DatabaseGHSA-H59X-P739-982C
HistoryMar 04, 2024 - 12:30 a.m.

LangChain directory traversal vulnerability

2024-03-0400:30:53
GitHub Advisory Database
github.com
15
langchain
directory traversal
remote code execution
load_chain call
github repository
api key disclosure
language model.

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

AI Score

7.9

Confidence

High

EPSS

0

Percentile

15.5%

LangChain through 0.1.10 allows …/ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution.

Affected configurations

Vulners
Node
langchainlangchain-experimentalRange00.1.30
OR
langchainlangchainRange<0.0.339
VendorProductVersionCPE
langchainlangchain-experimental*cpe:2.3:a:langchain:langchain-experimental:*:*:*:*:*:*:*:*
langchainlangchain*cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

AI Score

7.9

Confidence

High

EPSS

0

Percentile

15.5%