We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-8309

SQL Injection in langchain-ai/langchain



Description

A vulnerability in the GraphCypherQAChain class of langchain-ai/langchain version 0.2.5 allows for SQL injection through prompt injection. This vulnerability can lead to unauthorized data manipulation, data exfiltration, denial of service (DoS) by deleting all data, breaches in multi-tenant security environments, and data integrity issues. Attackers can create, update, or delete nodes and relationships without proper authorization, extract sensitive data, disrupt services, access data across different tenants, and compromise the integrity of the database.

Reserved 2024-08-29 | Published 2024-10-29 | Updated 2024-10-29 | Assigner @huntr_ai


MEDIUM: 4.9CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Problem types

CWE-89 Improper Neutralization of Special Elements used in an SQL Command

Product status

Any version before 0.3.0
affected

References

huntr.com/bounties/8f4ad910-7fdc-4089-8f0a-b5df5f32e7c5

github.com/...ommit/c2a3021bb0c5f54649d380b42a0684ca5778c255

cve.org (CVE-2024-8309)

nvd.nist.gov (CVE-2024-8309)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-8309

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.