CVE-2024-28088

LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution. (A patch is available as of release 0.1.29 of langchain-core.)
Configurations

No configuration.

History

26 Aug 2024, 20:35

Type Values Removed Values Added
CWE CWE-31
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1

13 Mar 2024, 21:16

Type Values Removed Values Added
References
  • () https://github.com/langchain-ai/langchain/pull/18600 -
Summary
  • (es) LangChain hasta 0.1.10 permite el Directory Traversal ../ por parte de un actor que puede controlar la parte final del parámetro de ruta en una llamada load_chain. Esto omite el comportamiento previsto de cargar configuraciones solo desde el repositorio GitHub hwchase17/langchain-hub. El resultado puede ser la divulgación de una clave API para un servicio en línea de modelo de lenguaje grande o la ejecución remota de código.
Summary (en) LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution. (en) LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution. (A patch is available as of release 0.1.29 of langchain-core.)

04 Mar 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-04 00:15

Updated : 2024-08-26 20:35


NVD link : CVE-2024-28088

Mitre link : CVE-2024-28088

CVE.ORG link : CVE-2024-28088


JSON object : View

Products Affected

No product.

CWE
CWE-31

Path Traversal: 'dir\..\..\filename'