Vulnerability Description
A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langchainjs version 0.2.5. This vulnerability allows attackers to save files anywhere in the filesystem, overwrite existing text files, read `.txt` files, and delete files. The vulnerability is exploited through the `setFileContent`, `getParsedFile`, and `mdelete` methods, which do not properly sanitize user input.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Langchain | Langchain.Js | 0.2.5 |
Related Weaknesses (CWE)
References
- https://github.com/langchain-ai/langchainjs/commit/a0fad77d6b569e5872bd4a9d33be0Patch
- https://huntr.com/bounties/8fe40685-b714-4191-af7a-3de5e5628ceeExploitThird Party Advisory
FAQ
What is CVE-2024-7774?
CVE-2024-7774 is a vulnerability with a CVSS score of 9.1 (CRITICAL). A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langchainjs version 0.2.5. This vulnerability allows attackers to save files anywhere in the filesystem, overwrite exi...
How severe is CVE-2024-7774?
CVE-2024-7774 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-7774?
Check the references section above for vendor advisories and patch information. Affected products include: Langchain Langchain.Js.