A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langchainjs version 0.2.5. This vulnerability allows attackers to save files anywhere in the filesystem, overwrite existing text files, read `.txt` files, and delete files. The vulnerability is exploited through the `setFileContent`, `getParsedFile`, and `mdelete` methods, which do not properly sanitize user input.
Metrics
Affected Vendors & Products
References
History
Thu, 31 Oct 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Langchain
Langchain langchain |
|
Weaknesses | CWE-22 | |
CPEs | cpe:2.3:a:langchain:langchain:0.2.5:*:*:*:*:*:*:* | |
Vendors & Products |
Langchain
Langchain langchain |
|
Metrics |
cvssV3_1
|
Tue, 29 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Langchain-ai
Langchain-ai langchain-ai\/langchainjs |
|
CPEs | cpe:2.3:a:langchain-ai:langchain-ai\/langchainjs:*:*:*:*:*:*:*:* | |
Vendors & Products |
Langchain-ai
Langchain-ai langchain-ai\/langchainjs |
|
Metrics |
ssvc
|
Tue, 29 Oct 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langchainjs version 0.2.5. This vulnerability allows attackers to save files anywhere in the filesystem, overwrite existing text files, read `.txt` files, and delete files. The vulnerability is exploited through the `setFileContent`, `getParsedFile`, and `mdelete` methods, which do not properly sanitize user input. | |
Title | Path Traversal in langchain-ai/langchainjs | |
Weaknesses | CWE-29 | |
References |
| |
Metrics |
cvssV3_0
|
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-10-29T12:49:21.165Z
Updated: 2024-10-29T13:31:38.566Z
Reserved: 2024-08-13T21:13:38.960Z
Link: CVE-2024-7774
Vulnrichment
Updated: 2024-10-29T13:31:28.791Z
NVD
Status : Analyzed
Published: 2024-10-29T13:15:09.930
Modified: 2024-10-31T15:39:04.510
Link: CVE-2024-7774
Redhat
No data.