First published: Mon Oct 09 2023(Updated: )
langchain_experimental (aka LangChain Experimental) in LangChain before 0.0.306 allows an attacker to bypass the CVE-2023-36258 fix and execute arbitrary code via __import__ in Python code, which is not prohibited by pal_chain/base.py.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Langchain Langchain Experimental | =0.0.14 | |
pip/langchain-experimental | <=0.0.14 | |
=0.0.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44467 is a vulnerability in langchain_experimental 0.0.14 that allows an attacker to bypass a previous fix and execute arbitrary code.
CVE-2023-44467 works by exploiting the PALChain in the python exec method.
Yes, langchain_experimental 0.0.14 is affected by CVE-2023-44467.
The severity of CVE-2023-44467 is not specified in the provided information.
To fix CVE-2023-44467, update langchain_experimental to a version that includes the fix or apply the relevant patch provided by the vendor.