CVE-2024-27444.yaml
1 info: 2 name: langchain 3 cve: CVE-2024-27444 4 summary: LangChain Experimental vulnerable to arbitrary code execution 5 details: | 6 langchain_experimental (aka LangChain Experimental) before 0.0.52, part of LangChain before 0.1.8, 7 allows an attacker to bypass the CVE-2023-44467 fix and execute arbitrary code via the 8 `__import__`, `__subclasses__`, `__builtins__`, `__globals__`, `__getattribute__`, 9 `__bases__`, `__mro__`, or `__base__` attribute in Python code. These are not prohibited by 10 `pal_chain/base.py`. 11 cvss: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 12 severity: CRITICAL 13 security_advise: | 14 1. Upgrade to langchain-experimental>=0.0.52 and LangChain>=0.1.8 15 2. Review and patch any custom code that may utilize the vulnerable attributes 16 3. Monitor for any suspicious activity post-upgrade 17 rule: version < "0.0.52" || version < "0.1.8" 18 references: 19 - https://nvd.nist.gov/vuln/detail/CVE-2024-27444 20 - https://github.com/langchain-ai/langchain/commit/de9a6cdf163ed00adaf2e559203ed0a9ca2f1de7 21 - https://github.com/langchain-ai/langchain