### [CVE-2024-0243](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0243) ![](https://img.shields.io/static/v1?label=Product&message=langchain-ai%2Flangchain&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%200.1.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)&color=brighgreen) ### Description With the following crawler configuration:```pythonfrom bs4 import BeautifulSoup as Soupurl = "https://example.com"loader = RecursiveUrlLoader( url=url, max_depth=2, extractor=lambda x: Soup(x, "html.parser").text)docs = loader.load()```An attacker in control of the contents of `https://example.com` could place a malicious HTML file in there with links like "https://example.completely.different/my_file.html" and the crawler would proceed to download that file as well even though `prevent_outside=True`.https://github.com/langchain-ai/langchain/blob/bf0b3cc0b5ade1fb95a5b1b6fa260e99064c2e22/libs/community/langchain_community/document_loaders/recursive_url_loader.py#L51-L51Resolved in https://github.com/langchain-ai/langchain/pull/15559 ### POC #### Reference - https://huntr.com/bounties/370904e7-10ac-40a4-a8d4-e2d16e1ca861 #### Github No PoCs found on GitHub currently.