Lucene search

K
githubGitHub Advisory DatabaseGHSA-GJJR-63X4-V8CQ
HistoryOct 09, 2023 - 9:30 p.m.

langchain_experimental vulnerable to arbitrary code execution via PALChain in the python exec method

2023-10-0921:30:27
GitHub Advisory Database
github.com
16
vulnerable
arbitrary code execution
bypass
palchain
python
cve-2023-36258 fix

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

71.7%

langchain_experimental 0.0.14 allows an attacker to bypass the CVE-2023-36258 fix and execute arbitrary code via the PALChain in the python exec method.

Affected configurations

Vulners
Node
langchainlangchain-experimentalRange0.0.14
VendorProductVersionCPE
langchainlangchain-experimental*cpe:2.3:a:langchain:langchain-experimental:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

71.7%