Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach the "POST /api/v1/custom_component" endpoint and provide a Python script.
References
Link | Resource |
---|---|
https://github.com/langflow-ai/langflow/issues/1973 | Exploit Issue Tracking |
https://github.com/langflow-ai/langflow/issues/1973 | Exploit Issue Tracking |
Configurations
History
21 Nov 2024, 09:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/langflow-ai/langflow/issues/1973 - Exploit, Issue Tracking |
03 Jul 2024, 02:04
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-94 |
12 Jun 2024, 17:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
First Time |
Langflow langflow
Langflow |
|
References | () https://github.com/langflow-ai/langflow/issues/1973 - Exploit, Issue Tracking | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:* | |
CWE | NVD-CWE-noinfo |
10 Jun 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-10 20:15
Updated : 2024-11-21 09:23
NVD link : CVE-2024-37014
Mitre link : CVE-2024-37014
CVE.ORG link : CVE-2024-37014
JSON object : View
Products Affected
langflow
- langflow
CWE