CVE-2023-36258
https://notcve.org/view.php?id=CVE-2023-36258
An issue in LangChain before 0.0.236 allows an attacker to execute arbitrary code because Python code with os.system, exec, or eval can be used. • https://github.com/hwchase17/langchain/issues/5872 •
CVE-2023-34541
https://notcve.org/view.php?id=CVE-2023-34541
Langchain 0.0.171 is vulnerable to Arbitrary code execution in load_prompt. • https://github.com/hwchase17/langchain/issues/4849 •
CVE-2023-34540
https://notcve.org/view.php?id=CVE-2023-34540
Langchain before v0.0.225 was discovered to contain a remote code execution (RCE) vulnerability in the component JiraAPIWrapper (aka the JIRA API wrapper). This vulnerability allows attackers to execute arbitrary code via crafted input. As noted in the "releases/tag" reference, a fix is available. • https://github.com/hwchase17/langchain/issues/4833 https://github.com/langchain-ai/langchain/pull/6992 https://github.com/langchain-ai/langchain/releases/tag/v0.0.225 •
CVE-2023-29374
https://notcve.org/view.php?id=CVE-2023-29374
In LangChain through 0.0.131, the LLMMathChain chain allows prompt injection attacks that can execute arbitrary code via the Python exec method. • https://github.com/hwchase17/langchain/issues/1026 https://github.com/hwchase17/langchain/issues/814 https://github.com/hwchase17/langchain/pull/1119 https://twitter.com/rharang/status/1641899743608463365/photo/1 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •