CVE-2024-37014

Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach the "POST /api/v1/custom_component" endpoint and provide a Python script.
References
Link Resource
https://github.com/langflow-ai/langflow/issues/1973 Exploit Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*

History

03 Jul 2024, 02:04

Type Values Removed Values Added
CWE CWE-94

12 Jun 2024, 17:57

Type Values Removed Values Added
CPE cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*
References () https://github.com/langflow-ai/langflow/issues/1973 - () https://github.com/langflow-ai/langflow/issues/1973 - Exploit, Issue Tracking
First Time Langflow
Langflow langflow
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
Summary
  • (es) Langflow hasta la versión 0.6.19 permite la ejecución remota de código si los usuarios que no son de confianza pueden acceder al endpoint "POST /api/v1/custom_component" y proporcionar un script de Python.
CWE NVD-CWE-noinfo

10 Jun 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-10 20:15

Updated : 2024-07-03 02:04


NVD link : CVE-2024-37014

Mitre link : CVE-2024-37014

CVE.ORG link : CVE-2024-37014


JSON object : View

Products Affected

langflow

  • langflow
CWE
NVD-CWE-noinfo CWE-94

Improper Control of Generation of Code ('Code Injection')