LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution. (A patch is available as of release 0.1.29 of langchain-core.)
References
Configurations
No configuration.
History
26 Aug 2024, 20:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-31 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
13 Mar 2024, 21:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
|
Summary | (en) LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution. (A patch is available as of release 0.1.29 of langchain-core.) |
04 Mar 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-04 00:15
Updated : 2024-08-26 20:35
NVD link : CVE-2024-28088
Mitre link : CVE-2024-28088
CVE.ORG link : CVE-2024-28088
JSON object : View
Products Affected
No product.
CWE
CWE-31
Path Traversal: 'dir\..\..\filename'