A vulnerability in the GraphCypherQAChain class of langchain-ai/langchain version 0.2.5 allows for SQL injection through prompt injection. This vulnerability can lead to unauthorized data...
Full analysis pending. Showing NVD description excerpt.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| langchain | pip | < 0.2.0 | 0.2.0 |
| langchain | pip | — | No patch |
| langchain-community | pip | >= 0.2.0, < 0.2.19 | 0.2.19 |
Severity & Risk
Recommended Action
Patch available
Update langchain to version 0.2.0
Update langchain-community to version 0.2.19
Compliance Impact
Compliance analysis pending. Sign in for full compliance mapping when available.
Technical Details
NVD Description
A vulnerability in the GraphCypherQAChain class of langchain-ai/langchain version 0.2.5 allows for SQL injection through prompt injection. This vulnerability can lead to unauthorized data manipulation, data exfiltration, denial of service (DoS) by deleting all data, breaches in multi-tenant security environments, and data integrity issues. Attackers can create, update, or delete nodes and relationships without proper authorization, extract sensitive data, disrupt services, access data across different tenants, and compromise the integrity of the database.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References
- github.com/advisories/GHSA-45pg-36p6-83v9
- github.com/langchain-ai/langchain/commit/64c317eba05fbac0c6a6fc5aa192bc0d7130972e
- github.com/langchain-ai/langchain/commit/c2a3021bb0c5f54649d380b42a0684ca5778c255
- github.com/pypa/advisory-database/tree/main/vulns/langchain/PYSEC-2024-115.yaml
- huntr.com/bounties/8f4ad910-7fdc-4089-8f0a-b5df5f32e7c5
- nvd.nist.gov/vuln/detail/CVE-2024-8309
- github.com/langchain-ai/langchain/commit/c2a3021bb0c5f54649d380b42a0684ca5778c255 Patch
- huntr.com/bounties/8f4ad910-7fdc-4089-8f0a-b5df5f32e7c5 Exploit 3rd Party