CVE-2024-37014

Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach the "POST /api/v1/custom_component" endpoint and provide a Python script.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:23

Type Values Removed Values Added
References () https://github.com/langflow-ai/langflow/issues/1973 - Exploit, Issue Tracking () https://github.com/langflow-ai/langflow/issues/1973 - Exploit, Issue Tracking

03 Jul 2024, 02:04

Type Values Removed Values Added
CWE CWE-94

12 Jun 2024, 17:57

Type Values Removed Values Added
Summary
  • (es) Langflow hasta la versión 0.6.19 permite la ejecución remota de código si los usuarios que no son de confianza pueden acceder al endpoint "POST /api/v1/custom_component" y proporcionar un script de Python.
First Time Langflow langflow
Langflow
References () https://github.com/langflow-ai/langflow/issues/1973 - () https://github.com/langflow-ai/langflow/issues/1973 - Exploit, Issue Tracking
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo

10 Jun 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-10 20:15

Updated : 2024-11-21 09:23


NVD link : CVE-2024-37014

Mitre link : CVE-2024-37014

CVE.ORG link : CVE-2024-37014


JSON object : View

Products Affected

langflow

  • langflow
CWE
NVD-CWE-noinfo CWE-94

Improper Control of Generation of Code ('Code Injection')