We found results for “”
CVE-2024-7774
Good to know:
Date: October 29, 2024
A path traversal vulnerability exists in the "getFullPath" method of langchain-ai/langchainjs version 0.2.5. This vulnerability allows attackers to save files anywhere in the filesystem, overwrite existing text files, read ".txt" files, and delete files. The vulnerability is exploited through the "setFileContent", "getParsedFile", and "mdelete" methods, which do not properly sanitize user input.
Language: TYPE_SCRIPT
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Top Fix
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


