CVE-2024-28088

LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution. (A patch is available as of release 0.1.29 of langchain-core.)
Configurations

Configuration 1 (hide)

cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*

History

08 Jan 2025, 16:13

Type Values Removed Values Added
References () https://github.com/PinkDraconian/PoC-Langchain-RCE/blob/main/README.md - () https://github.com/PinkDraconian/PoC-Langchain-RCE/blob/main/README.md - Exploit, Third Party Advisory
References () https://github.com/langchain-ai/langchain/blob/f96dd57501131840b713ed7c2e86cbf1ddc2761f/libs/core/langchain_core/utils/loading.py - () https://github.com/langchain-ai/langchain/blob/f96dd57501131840b713ed7c2e86cbf1ddc2761f/libs/core/langchain_core/utils/loading.py - Product
References () https://github.com/langchain-ai/langchain/pull/18600 - () https://github.com/langchain-ai/langchain/pull/18600 - Exploit, Issue Tracking, Patch
CWE CWE-22
CPE cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*
First Time Langchain langchain
Langchain

21 Nov 2024, 09:05

Type Values Removed Values Added
References () https://github.com/PinkDraconian/PoC-Langchain-RCE/blob/main/README.md - () https://github.com/PinkDraconian/PoC-Langchain-RCE/blob/main/README.md -
References () https://github.com/langchain-ai/langchain/blob/f96dd57501131840b713ed7c2e86cbf1ddc2761f/libs/core/langchain_core/utils/loading.py - () https://github.com/langchain-ai/langchain/blob/f96dd57501131840b713ed7c2e86cbf1ddc2761f/libs/core/langchain_core/utils/loading.py -
References () https://github.com/langchain-ai/langchain/pull/18600 - () https://github.com/langchain-ai/langchain/pull/18600 -

26 Aug 2024, 20:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1
CWE CWE-31

13 Mar 2024, 21:16

Type Values Removed Values Added
References
  • () https://github.com/langchain-ai/langchain/pull/18600 -
Summary LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution. LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution. (A patch is available as of release 0.1.29 of langchain-core.)

04 Mar 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-04 00:15

Updated : 2025-01-08 16:13


NVD link : CVE-2024-28088

Mitre link : CVE-2024-28088

CVE.ORG link : CVE-2024-28088


JSON object : View

Products Affected

langchain

  • langchain
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-31

Path Traversal: 'dir\..\..\filename'