Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach the "POST /api/v1/custom_component" endpoint and provide a Python script.
References
Link | Resource |
---|---|
https://github.com/langflow-ai/langflow/issues/1973 | Exploit Issue Tracking |
Configurations
History
03 Jul 2024, 02:04
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-94 |
12 Jun 2024, 17:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:* | |
References | () https://github.com/langflow-ai/langflow/issues/1973 - Exploit, Issue Tracking | |
First Time |
Langflow
Langflow langflow |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
Summary |
|
|
CWE | NVD-CWE-noinfo |
10 Jun 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-10 20:15
Updated : 2024-07-03 02:04
NVD link : CVE-2024-37014
Mitre link : CVE-2024-37014
CVE.ORG link : CVE-2024-37014
JSON object : View
Products Affected
langflow
- langflow
CWE