CVE-2023-36188.yaml
1 info: 2 name: langchain 3 cve: CVE-2023-36188 4 summary: langchain 存在任意代码执行漏洞 5 details: langchain 中的一个问题允许远程攻击者通过 Python exec 方法中的 PALChain 参数执行任意代码。 6 cvss: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 7 severity: CRITICAL 8 security_advise: 升级到 langchain >= "0.0.236" 版本以修复此漏洞。 9 rule: version < "0.0.236" 10 references: 11 - https://nvd.nist.gov/vuln/detail/CVE-2023-36188 12 - https://github.com/langchain-ai/langchain/issues/5872 13 - https://github.com/langchain-ai/langchain/pull/6003 14 - https://github.com/langchain-ai/langchain/pull/8425 15 - https://github.com/langchain-ai/langchain/commit/e294ba475a355feb95003ed8f1a2b99942509a9e 16 - https://github.com/langchain-ai/langchain 17 - https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2023-109.yaml