Skip to content

Commit

Permalink
Merge pull request #5005 from github/efriis-GHSA-45pg-36p6-83v9
Browse files Browse the repository at this point in the history
  • Loading branch information
advisory-database[bot] authored Nov 12, 2024
2 parents 9301e97 + c2ec669 commit 027015c
Showing 1 changed file with 6 additions and 6 deletions.
Original file line number Diff line number Diff line change
@@ -1,18 +1,14 @@
{
"schema_version": "1.4.0",
"id": "GHSA-45pg-36p6-83v9",
"modified": "2024-11-07T19:23:53Z",
"modified": "2024-11-05T16:58:28Z",
"published": "2024-10-29T15:32:05Z",
"aliases": [
"CVE-2024-8309"
],
"summary": "Langchain SQL Injection vulnerability",
"details": "A vulnerability in the GraphCypherQAChain class of langchain-ai/langchain version 0.2.5 allows for SQL injection through prompt injection. This vulnerability can lead to unauthorized data manipulation, data exfiltration, denial of service (DoS) by deleting all data, breaches in multi-tenant security environments, and data integrity issues. Attackers can create, update, or delete nodes and relationships without proper authorization, extract sensitive data, disrupt services, access data across different tenants, and compromise the integrity of the database.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"
Expand All @@ -32,7 +28,7 @@
"introduced": "0.2.0"
},
{
"fixed": "0.3.0"
"fixed": "0.2.19"
}
]
}
Expand Down Expand Up @@ -63,6 +59,10 @@
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8309"
},
{
"type": "WEB",
"url": "https://github.com/langchain-ai/langchain/commit/64c317eba05fbac0c6a6fc5aa192bc0d7130972e"
},
{
"type": "WEB",
"url": "https://github.com/langchain-ai/langchain/commit/c2a3021bb0c5f54649d380b42a0684ca5778c255"
Expand Down

0 comments on commit 027015c

Please sign in to comment.