mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-19 17:30:12 +00:00
1.4 KiB
1.4 KiB
CVE-2024-0243
Description
With the following crawler configuration:pythonfrom bs4 import BeautifulSoup as Soupurl = "https://example.com"loader = RecursiveUrlLoader( url=url, max_depth=2, extractor=lambda x: Soup(x, "html.parser").text)docs = loader.load()
An attacker in control of the contents of https://example.com
could place a malicious HTML file in there with links like "https://example.completely.different/my_file.html" and the crawler would proceed to download that file as well even though prevent_outside=True
.bf0b3cc0b5/libs/community/langchain_community/document_loaders/recursive_url_loader.py (L51-L51Resolved)
in https://github.com/langchain-ai/langchain/pull/15559
POC
Reference
- https://huntr.com/bounties/370904e7-10ac-40a4-a8d4-e2d16e1ca861
- https://huntr.com/bounties/370904e7-10ac-40a4-a8d4-e2d16e1ca861
Github
No PoCs found on GitHub currently.