langchain-core@0.1.33rc1 vulnerabilities

Building applications with LLMs through composability

  • latest version

    0.3.54

  • latest non vulnerable version

  • first published

    1 years ago

  • latest version published

    2 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the langchain-core package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Exposure of Sensitive System Information to an Unauthorized Control Sphere

    langchain-core is a Building applications with LLMs through composability

    Affected versions of this package are vulnerable to Exposure of Sensitive System Information to an Unauthorized Control Sphere in the ImagePromptTemplate in image.py, which can be instantiated with input variables that can contains paths exposing files from the underlying filesystem. The output of the prompt template may be exposed to the model and subsequently the unauthorized user.

    How to fix Exposure of Sensitive System Information to an Unauthorized Control Sphere?

    Upgrade langchain-core to version 0.1.53, 0.2.43, 0.3.15 or higher.

    [,0.1.53)[0.2.0rc1,0.2.43)[0.3.0.dev0,0.3.15)
    • M
    Improper Restriction of XML External Entity Reference

    langchain-core is a Building applications with LLMs through composability

    Affected versions of this package are vulnerable to Improper Restriction of XML External Entity Reference due to the XMLOutputParser using the etree module from the XML parser in the standard python library, which is known to have vulnerabilities. This issue primarily affects users that combine an LLM (or agent) with the XMLOutputParser and expose the component via an endpoint on a web-service. A malicious party could attempt to manipulate the LLM to produce a malicious payload for the parser, compromising the availability of the service.

    Note:

    This is only exploitable if

    1. XMLOutputParser is used

    2. Malicious input is passed into the XMLOutputParser either directly or by trying to manipulate an LLM to do so on the user's behalf

    3. The component is exposed via a web-service.

    How to fix Improper Restriction of XML External Entity Reference?

    Upgrade langchain-core to version 0.1.34 or higher.

    [,0.1.34)