CVE-2023-36258

An issue in LangChain before 0.0.236 allows an attacker to execute arbitrary code because Python code with os.system, exec, or eval can be used.
References
Link Resource
https://github.com/hwchase17/langchain/issues/5872 Exploit Issue Tracking Mitigation
Configurations

Configuration 1 (hide)

cpe:2.3:a:langchain:langchain:0.0.199:*:*:*:*:*:*:*

History

26 Feb 2024, 16:27

Type Values Removed Values Added
Summary (en) An issue in langchain v.0.0.199 allows an attacker to execute arbitrary code via the PALChain in the python exec method. (en) An issue in LangChain before 0.0.236 allows an attacker to execute arbitrary code because Python code with os.system, exec, or eval can be used.

10 Jul 2023, 17:01

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:langchain:langchain:0.0.199:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
References (MISC) https://github.com/hwchase17/langchain/issues/5872 - (MISC) https://github.com/hwchase17/langchain/issues/5872 - Exploit, Issue Tracking, Mitigation

03 Jul 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-03 21:15

Updated : 2024-02-26 16:27


NVD link : CVE-2023-36258

Mitre link : CVE-2023-36258

CVE.ORG link : CVE-2023-36258


JSON object : View

Products Affected

langchain

  • langchain