An issue in LangChain before 0.0.236 allows an attacker to execute arbitrary code because Python code with os.system, exec, or eval can be used.
References
Link | Resource |
---|---|
https://github.com/hwchase17/langchain/issues/5872 | Exploit Issue Tracking Mitigation |
Configurations
History
26 Feb 2024, 16:27
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) An issue in LangChain before 0.0.236 allows an attacker to execute arbitrary code because Python code with os.system, exec, or eval can be used. |
10 Jul 2023, 17:01
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:langchain:langchain:0.0.199:*:*:*:*:*:*:* | |
CWE | NVD-CWE-noinfo | |
References | (MISC) https://github.com/hwchase17/langchain/issues/5872 - Exploit, Issue Tracking, Mitigation |
03 Jul 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-03 21:15
Updated : 2024-02-26 16:27
NVD link : CVE-2023-36258
Mitre link : CVE-2023-36258
CVE.ORG link : CVE-2023-36258
JSON object : View
Products Affected
langchain
- langchain
CWE