Gửi #289390: langchain-ai langchain 0.1.9 Remote Code Execution (RCE)thông tin

tiêu đềlangchain-ai langchain 0.1.9 Remote Code Execution (RCE)
Mô tảA command execution vulnerability exists in the `langchain` project version `0.1.9`. The code in line `106` of the `libs/community/langchain_community/retrievers/tfidf.py` file in this project have a function named `load_local`. There are two unsecured functions `joblib.load` and `pickle.load` in this function, and By constructing the malicious file, I generated the `tfidf_vectorizer.jobli`b and `tfidf_vectorizer.pkl` files in the PoC.pkl directory. They both contain strings that can be executed remotely by command., which, by not using a more secure way of loading and checking external files, resulted in being able to trigger a command execution that triggers an RCE via the commands contained in the malicious files.
Nguồn⚠️ https://github.com/bayuncao/vul-cve-16
Người dùng
 bayuncao (UID 50143)
Đệ trình28/02/2024 04:31 (cách đây 2 những năm)
Kiểm duyệt01/03/2024 07:41 (2 days later)
Trạng tháiđược chấp nhận
Mục VulDB255372 [LangChain langchain_community 0.0.26 TFIDFRetriever tfidf.py load_local nâng cao đặc quyền]
điểm20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!