A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langchainjs version 0.2.5. This vulnerability allows attackers to save files anywhere in the filesystem, overwrite existing text files, read `.txt` files, and delete files. The vulnerability is exploited through the `setFileContent`, `getParsedFile`, and `mdelete` methods, which do not properly sanitize user input.
References
Link | Resource |
---|---|
https://github.com/langchain-ai/langchainjs/commit/a0fad77d6b569e5872bd4a9d33be0c0785e538a9 | Patch |
https://huntr.com/bounties/8fe40685-b714-4191-af7a-3de5e5628cee | Exploit Third Party Advisory |
Configurations
History
31 Oct 2024, 15:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/langchain-ai/langchainjs/commit/a0fad77d6b569e5872bd4a9d33be0c0785e538a9 - Patch | |
References | () https://huntr.com/bounties/8fe40685-b714-4191-af7a-3de5e5628cee - Exploit, Third Party Advisory | |
Summary |
|
|
CPE | cpe:2.3:a:langchain:langchain:0.2.5:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
First Time |
Langchain
Langchain langchain |
|
CWE | CWE-22 |
29 Oct 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-29 13:15
Updated : 2024-10-31 15:39
NVD link : CVE-2024-7774
Mitre link : CVE-2024-7774
CVE.ORG link : CVE-2024-7774
JSON object : View
Products Affected
langchain
- langchain