PyPi: Langchain

CVE-2024-0243

Safety vulnerability ID: 65692

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Feb 26, 2024 Updated at Feb 25, 2025
Scan your Python projects for vulnerabilities →

Advisory

In versions of Langchain-ai before 0.1.0, a vulnerability exists where a crawler, using a specified configuration, could mistakenly download malicious content from an external site. This occurs when an attacker adds a malicious HTML file on https://example.com that includes links to outside sites, contrary to the crawler's settings intended to restrict such actions.

Affected package

langchain

Latest version: 0.3.19

Building applications with LLMs through composability

Affected versions

Fixed versions

Vulnerability changelog

With the following crawler configuration: ```python from bs4 import BeautifulSoup as Soup url = "https://example.com" loader = RecursiveUrlLoader( url=url, max_depth=2, extractor=lambda x: Soup(x, "html.parser").text ) docs = loader.load() ``` An attacker in control of the contents of `https://example.com` could place a malicious HTML file in there with links like "https://example.completely.different/my_file.html" and the crawler would proceed to download that file as well even though `prevent_outside=True`. https://github.com/langchain-ai/langchain/blob/bf0b3cc0b5ade1fb95a5b1b6fa260e99064c2e22/libs/community/langchain_community/document_loaders/recursive_url_loader.py#L51-L51 Resolved in https://github.com/langchain-ai/langchain/pull/15559 See CVE-2024-0243.


MISC:https://github.com/langchain-ai/langchain/commit/bf0b3cc0b5ade1fb95a5b1b6fa260e99064c2e22: https://github.com/langchain-ai/langchain/commit/bf0b3cc0b5ade1fb95a5b1b6fa260e99064c2e22
MISC:https://huntr.com/bounties/370904e7-10ac-40a4-a8d4-e2d16e1ca861: https://huntr.com/bounties/370904e7-10ac-40a4-a8d4-e2d16e1ca861

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 8.1

CVSS v3 Details

HIGH 8.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
HIGH
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
HIGH
Availability Availability (A)
HIGH