/ data / vuln_en / langchain / CVE-2024-8309.yaml
CVE-2024-8309.yaml
 1  info:
 2    name: langchain
 3    cve: CVE-2024-8309
 4    summary: Langchain SQL Injection vulnerability
 5    details: |
 6      A vulnerability in the GraphCypherQAChain class of langchain-ai/langchain version 0.2.5 allows for SQL injection through prompt injection. 
 7      This can lead to unauthorized data manipulation, data exfiltration, denial of service (DoS), breaches in multi-tenant security environments, and data integrity issues.
 8    cvss: CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
 9    severity: HIGH
10    security_advise: |
11      1. Upgrade to langchain-community>=0.2.19 or langchain>=0.2.0
12      2. Review and sanitize all user inputs to prevent SQL injection
13      3. Implement least privilege access controls for database operations
14  rule: (version >= "0.2.0" && version < "0.2.19") || (version >= "0" && version < "0.2.0")
15  references:
16    - https://nvd.nist.gov/vuln/detail/CVE-2024-8309
17    - https://github.com/langchain-ai/langchain/commit/64c317eba05fbac0c6a6fc5aa192bc0d7130972e
18    - https://github.com/langchain-ai/langchain/commit/c2a3021bb0c5f54649d380b42a0684ca5778c255
19    - https://github.com/langchain-ai/langchain
20    - https://github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2024-115.yaml
21    - https://huntr.com/bounties/8f4ad910-7fdc-4089-8f0a-b5df5f32e7c5