CVE-2024-8309 – langchain-community
Package
Manager: pip
Name: langchain-community
Vulnerable Version: >=0.2.0 <0.2.19
Severity
Level: Low
CVSS v3.1: CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00633 pctl0.69454
Details
Langchain SQL Injection vulnerability A vulnerability in the GraphCypherQAChain class of langchain-ai/langchain version 0.2.5 allows for SQL injection through prompt injection. This vulnerability can lead to unauthorized data manipulation, data exfiltration, denial of service (DoS) by deleting all data, breaches in multi-tenant security environments, and data integrity issues. Attackers can create, update, or delete nodes and relationships without proper authorization, extract sensitive data, disrupt services, access data across different tenants, and compromise the integrity of the database.
Metadata
Created: 2024-10-29T15:32:05Z
Modified: 2024-11-12T19:57:59Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-45pg-36p6-83v9/GHSA-45pg-36p6-83v9.json
CWE IDs: ["CWE-74", "CWE-89"]
Alternative ID: GHSA-45pg-36p6-83v9
Finding: F106
Auto approve: 1