Skip to content

langchain Server-Side Request Forgery vulnerability

Low severity GitHub Reviewed Published Feb 26, 2024 to the GitHub Advisory Database • Updated Mar 13, 2024

Package

pip langchain (pip)

Affected versions

< 0.1.0

Patched versions

0.1.0

Description

With the following crawler configuration:

from bs4 import BeautifulSoup as Soup

url = "https://example.com"
loader = RecursiveUrlLoader(
    url=url, max_depth=2, extractor=lambda x: Soup(x, "html.parser").text 
)
docs = loader.load()

An attacker in control of the contents of https://example.com could place a malicious HTML file in there with links like "https://example.completely.different/my_file.html" and the crawler would proceed to download that file as well even though prevent_outside=True.

https://github.com/langchain-ai/langchain/blob/bf0b3cc0b5ade1fb95a5b1b6fa260e99064c2e22/libs/community/langchain_community/document_loaders/recursive_url_loader.py#L51-L51

Resolved in langchain-ai/langchain#15559

References

Published by the National Vulnerability Database Feb 26, 2024
Published to the GitHub Advisory Database Feb 26, 2024
Reviewed Feb 26, 2024
Last updated Mar 13, 2024

Severity

Low
3.7
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
High
Privileges required
High
User interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N

Weaknesses

CVE ID

CVE-2024-0243

GHSA ID

GHSA-h9j7-5xvc-qhg5
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.