pysec-2023-162
Vulnerability from pysec
Published
2023-09-01 16:15
Modified
2023-10-04 16:56
Severity ?
Details

An issue in LanChain-ai Langchain v.0.0.245 allows a remote attacker to execute arbitrary code via the evaluate function in the numexpr library.

Impacted products
Name purl
langchain pkg:pypi/langchain
Aliases



{
   affected: [
      {
         package: {
            ecosystem: "PyPI",
            name: "langchain",
            purl: "pkg:pypi/langchain",
         },
         ranges: [
            {
               events: [
                  {
                     introduced: "0",
                  },
                  {
                     fixed: "0.0.308",
                  },
               ],
               type: "ECOSYSTEM",
            },
         ],
         versions: [
            "0.0.1",
            "0.0.10",
            "0.0.100",
            "0.0.101",
            "0.0.101rc0",
            "0.0.102",
            "0.0.102rc0",
            "0.0.103",
            "0.0.104",
            "0.0.105",
            "0.0.106",
            "0.0.107",
            "0.0.108",
            "0.0.109",
            "0.0.11",
            "0.0.110",
            "0.0.111",
            "0.0.112",
            "0.0.113",
            "0.0.114",
            "0.0.115",
            "0.0.116",
            "0.0.117",
            "0.0.118",
            "0.0.119",
            "0.0.12",
            "0.0.120",
            "0.0.121",
            "0.0.122",
            "0.0.123",
            "0.0.124",
            "0.0.125",
            "0.0.126",
            "0.0.127",
            "0.0.128",
            "0.0.129",
            "0.0.13",
            "0.0.130",
            "0.0.131",
            "0.0.132",
            "0.0.133",
            "0.0.134",
            "0.0.135",
            "0.0.136",
            "0.0.137",
            "0.0.138",
            "0.0.139",
            "0.0.14",
            "0.0.140",
            "0.0.141",
            "0.0.142",
            "0.0.143",
            "0.0.144",
            "0.0.145",
            "0.0.146",
            "0.0.147",
            "0.0.148",
            "0.0.149",
            "0.0.15",
            "0.0.150",
            "0.0.151",
            "0.0.152",
            "0.0.153",
            "0.0.154",
            "0.0.155",
            "0.0.156",
            "0.0.157",
            "0.0.158",
            "0.0.159",
            "0.0.16",
            "0.0.160",
            "0.0.161",
            "0.0.162",
            "0.0.163",
            "0.0.164",
            "0.0.165",
            "0.0.166",
            "0.0.167",
            "0.0.168",
            "0.0.169",
            "0.0.17",
            "0.0.170",
            "0.0.171",
            "0.0.172",
            "0.0.173",
            "0.0.174",
            "0.0.175",
            "0.0.176",
            "0.0.177",
            "0.0.178",
            "0.0.179",
            "0.0.18",
            "0.0.180",
            "0.0.181",
            "0.0.182",
            "0.0.183",
            "0.0.184",
            "0.0.185",
            "0.0.186",
            "0.0.187",
            "0.0.188",
            "0.0.189",
            "0.0.19",
            "0.0.190",
            "0.0.191",
            "0.0.192",
            "0.0.193",
            "0.0.194",
            "0.0.195",
            "0.0.196",
            "0.0.197",
            "0.0.198",
            "0.0.199",
            "0.0.2",
            "0.0.20",
            "0.0.200",
            "0.0.201",
            "0.0.202",
            "0.0.203",
            "0.0.204",
            "0.0.205",
            "0.0.206",
            "0.0.207",
            "0.0.208",
            "0.0.209",
            "0.0.21",
            "0.0.210",
            "0.0.211",
            "0.0.212",
            "0.0.213",
            "0.0.214",
            "0.0.215",
            "0.0.216",
            "0.0.217",
            "0.0.218",
            "0.0.219",
            "0.0.22",
            "0.0.220",
            "0.0.221",
            "0.0.222",
            "0.0.223",
            "0.0.224",
            "0.0.225",
            "0.0.226",
            "0.0.227",
            "0.0.228",
            "0.0.229",
            "0.0.23",
            "0.0.230",
            "0.0.231",
            "0.0.232",
            "0.0.233",
            "0.0.234",
            "0.0.235",
            "0.0.236",
            "0.0.237",
            "0.0.238",
            "0.0.239",
            "0.0.24",
            "0.0.240",
            "0.0.240rc0",
            "0.0.240rc1",
            "0.0.240rc4",
            "0.0.242",
            "0.0.243",
            "0.0.244",
            "0.0.245",
            "0.0.246",
            "0.0.247",
            "0.0.248",
            "0.0.249",
            "0.0.25",
            "0.0.250",
            "0.0.251",
            "0.0.252",
            "0.0.253",
            "0.0.254",
            "0.0.255",
            "0.0.256",
            "0.0.257",
            "0.0.258",
            "0.0.259",
            "0.0.26",
            "0.0.260",
            "0.0.261",
            "0.0.262",
            "0.0.263",
            "0.0.264",
            "0.0.265",
            "0.0.266",
            "0.0.267",
            "0.0.268",
            "0.0.269",
            "0.0.27",
            "0.0.270",
            "0.0.271",
            "0.0.272",
            "0.0.273",
            "0.0.274",
            "0.0.275",
            "0.0.276",
            "0.0.277",
            "0.0.278",
            "0.0.279",
            "0.0.28",
            "0.0.281",
            "0.0.29",
            "0.0.3",
            "0.0.30",
            "0.0.31",
            "0.0.32",
            "0.0.33",
            "0.0.34",
            "0.0.35",
            "0.0.36",
            "0.0.37",
            "0.0.38",
            "0.0.39",
            "0.0.4",
            "0.0.40",
            "0.0.41",
            "0.0.42",
            "0.0.43",
            "0.0.44",
            "0.0.45",
            "0.0.46",
            "0.0.47",
            "0.0.48",
            "0.0.49",
            "0.0.5",
            "0.0.50",
            "0.0.51",
            "0.0.52",
            "0.0.53",
            "0.0.54",
            "0.0.55",
            "0.0.56",
            "0.0.57",
            "0.0.58",
            "0.0.59",
            "0.0.6",
            "0.0.60",
            "0.0.61",
            "0.0.63",
            "0.0.64",
            "0.0.65",
            "0.0.66",
            "0.0.67",
            "0.0.68",
            "0.0.69",
            "0.0.7",
            "0.0.70",
            "0.0.71",
            "0.0.72",
            "0.0.73",
            "0.0.74",
            "0.0.75",
            "0.0.76",
            "0.0.77",
            "0.0.78",
            "0.0.79",
            "0.0.8",
            "0.0.80",
            "0.0.81",
            "0.0.82",
            "0.0.83",
            "0.0.84",
            "0.0.85",
            "0.0.86",
            "0.0.87",
            "0.0.88",
            "0.0.89",
            "0.0.9",
            "0.0.90",
            "0.0.91",
            "0.0.92",
            "0.0.93",
            "0.0.94",
            "0.0.95",
            "0.0.96",
            "0.0.97",
            "0.0.98",
            "0.0.99",
            "0.0.99rc0",
            "0.0.283",
            "0.0.284",
            "0.0.285",
            "0.0.286",
            "0.0.287",
            "0.0.288",
            "0.0.289",
            "0.0.290",
            "0.0.291",
            "0.0.292",
            "0.0.293",
            "0.0.294",
            "0.0.295",
            "0.0.296",
            "0.0.297",
            "0.0.298",
            "0.0.299",
            "0.0.300",
            "0.0.301",
            "0.0.302",
            "0.0.303",
            "0.0.304",
            "0.0.305",
            "0.0.306",
            "0.0.307",
         ],
      },
   ],
   aliases: [
      "CVE-2023-39631",
   ],
   details: "An issue in LanChain-ai Langchain v.0.0.245 allows a remote attacker to execute arbitrary code via the evaluate function in the numexpr library.",
   id: "PYSEC-2023-162",
   modified: "2023-10-04T16:56:57.465474Z",
   published: "2023-09-01T16:15:00Z",
   references: [
      {
         type: "EVIDENCE",
         url: "https://github.com/pydata/numexpr/issues/442",
      },
      {
         type: "REPORT",
         url: "https://github.com/pydata/numexpr/issues/442",
      },
      {
         type: "FIX",
         url: "https://github.com/pydata/numexpr/issues/442",
      },
      {
         type: "EVIDENCE",
         url: "https://github.com/langchain-ai/langchain/issues/8363",
      },
      {
         type: "REPORT",
         url: "https://github.com/langchain-ai/langchain/issues/8363",
      },
      {
         type: "FIX",
         url: "https://github.com/langchain-ai/langchain/pull/11302",
      },
   ],
   severity: [
      {
         score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
         type: "CVSS_V3",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.