CVE-2023-36281: langchain vulnerable to arbitrary code execution
(updated )
An issue in langchain v.0.0.171 allows a remote attacker to execute arbitrary code via the via the a json file to the load_prompt
parameter. This is related to __subclasses__
or a template.
References
- aisec.today/LangChain-2e6244a313dd46139c5ef28cbcab9e55
- github.com/advisories/GHSA-7gfq-f96f-g85j
- github.com/hwchase17/langchain/issues/4394
- github.com/langchain-ai/langchain
- github.com/langchain-ai/langchain/commit/22abeb9f6cc555591bf8e92b5e328e43aa07ff6c
- github.com/langchain-ai/langchain/pull/10252
- github.com/langchain-ai/langchain/releases/tag/v0.0.312
- github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-151.yaml
- nvd.nist.gov/vuln/detail/CVE-2023-36281
Detect and mitigate CVE-2023-36281 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →