Skip to content

LangChain directory traversal vulnerability

Low severity GitHub Reviewed Published Mar 4, 2024 to the GitHub Advisory Database • Updated Mar 14, 2024

Package

pip langchain (pip)

Affected versions

< 0.0.339

Patched versions

0.0.339
pip langchain-core (pip)
>= 0, < 0.1.30
0.1.30

Description

LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to control the final part of the path parameter in a load_chain call. This bypasses the intended behavior of loading configurations only from the hwchase17/langchain-hub GitHub repository. The outcome can be disclosure of an API key for a large language model online service, or remote code execution.

References

Published by the National Vulnerability Database Mar 4, 2024
Published to the GitHub Advisory Database Mar 4, 2024
Reviewed Mar 6, 2024
Last updated Mar 14, 2024

Severity

Low

EPSS score

0.045%
(17th percentile)

Weaknesses

No CWEs

CVE ID

CVE-2024-28088

GHSA ID

GHSA-h59x-p739-982c

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.