/ data / vuln_en / langchain / CVE-2024-3095.yaml
CVE-2024-3095.yaml
 1  info:
 2    name: langchain
 3    cve: CVE-2024-3095
 4    summary: Server-Side Request Forgery in langchain-community.retrievers.web_research.WebResearchRetriever
 5    details: |
 6      A Server-Side Request Forgery (SSRF) vulnerability exists in the Web Research Retriever component in langchain-community. 
 7      The vulnerability arises because the Web Research Retriever does not restrict requests to remote internet addresses, 
 8      allowing it to reach local addresses. This flaw enables attackers to execute port scans, access local services, 
 9      and in some scenarios, read instance metadata from cloud environments.
10    cvss: CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
11    severity: HIGH
12    security_advise: |
13      1. Upgrade to langchain-community >= 0.2.9
14      2. Implement a proxy to prevent requests to local addresses
15      3. Ensure users opt-in to the feature that may trigger SSRF
16  rule: version >= "0" && version < "0.2.9"
17  references:
18    - https://nvd.nist.gov/vuln/detail/CVE-2024-3095
19    - https://github.com/langchain-ai/langchain/pull/24451
20    - https://github.com/langchain-ai/langchain/commit/604dfe2d99246b0c09f047c604f0c63eafba31e7
21    - https://github.com/langchain-ai/langchain/releases/tag/langchain-community%3D%3D0.2.9
22    - https://huntr.com/bounties/e62d4895-2901-405b-9559-38276b6a5273