/ data / vuln_en / langchain / CVE-2024-1455.yaml
CVE-2024-1455.yaml
 1  info:
 2    name: langchain
 3    cve: CVE-2024-1455
 4    summary: LangChain's XMLOutputParser vulnerable to XML Entity Expansion
 5    details: |
 6      The XMLOutputParser in LangChain uses the etree module from the XML parser in the standard python library, which has some XML vulnerabilities.
 7      This primarily affects users that combine an LLM (or agent) with the `XMLOutputParser` and expose the component via an endpoint on a web-service. A successful attack is predicated on:
 8      1. Usage of XMLOutputParser
 9      2. Passing of malicious input into the XMLOutputParser either directly or by trying to manipulate an LLM to do so on the users behalf
10      3. Exposing the component via a web-service
11    cvss: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
12    severity: MEDIUM
13    security_advise: |
14      1. Upgrade to langchain-core>=0.1.35
15      2. Avoid exposing the XMLOutputParser component via web-services
16      3. Implement input validation to prevent malicious XML input
17  rule: version >= "0" && version < "0.1.35"
18  references:
19    - https://nvd.nist.gov/vuln/detail/CVE-2024-1455
20    - https://github.com/langchain-ai/langchain/pull/17250
21    - https://github.com/langchain-ai/langchain/pull/19653
22    - https://github.com/langchain-ai/langchain/pull/19660
23    - https://github.com/langchain-ai/langchain/commit/727d5023ce88e18e3074ef620a98137d26ff92a3
24    - https://github.com/langchain-ai/langchain
25    - https://huntr.com/bounties/4353571f-c70d-4bfd-ac08-3a89cecb45b6