CVE-2024-28088

LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution. (A patch is available as of release 0.1.29 of langchain-core.)
Configurations

Configuration 1 (hide)

cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*

History

08 Jan 2025, 16:13

Type Values Removed Values Added
CPE cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*
First Time Langchain langchain
Langchain
CWE CWE-22
References () https://github.com/PinkDraconian/PoC-Langchain-RCE/blob/main/README.md - () https://github.com/PinkDraconian/PoC-Langchain-RCE/blob/main/README.md - Exploit, Third Party Advisory
References () https://github.com/langchain-ai/langchain/blob/f96dd57501131840b713ed7c2e86cbf1ddc2761f/libs/core/langchain_core/utils/loading.py - () https://github.com/langchain-ai/langchain/blob/f96dd57501131840b713ed7c2e86cbf1ddc2761f/libs/core/langchain_core/utils/loading.py - Product
References () https://github.com/langchain-ai/langchain/pull/18600 - () https://github.com/langchain-ai/langchain/pull/18600 - Exploit, Issue Tracking, Patch

Information

Published : 2024-03-04 00:15

Updated : 2025-01-08 16:13


NVD link : CVE-2024-28088

Mitre link : CVE-2024-28088

CVE.ORG link : CVE-2024-28088


JSON object : View

Products Affected

langchain

  • langchain
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-31

Path Traversal: 'dir\..\..\filename'