Description
langchain_experimental (aka LangChain Experimental) in LangChain before 0.0.306 allows an attacker to bypass the CVE-2023-36258 fix and execute arbitrary code via __import__ in Python code, which is not prohibited by pal_chain/base.py.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gjjr-63x4-v8cq | langchain_experimental vulnerable to arbitrary code execution via PALChain in the python exec method |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T20:07:33.144Z
Reserved: 2023-09-29T00:00:00.000Z
Link: CVE-2023-44467
No data.
Status : Modified
Published: 2023-10-09T20:15:10.480
Modified: 2024-11-21T08:25:56.420
Link: CVE-2023-44467
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA