脆弱性情報
高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
脆弱性タイトル
LangChain Community: redirect chaining can lead to SSRF bypass via RecursiveUrlLoader
脆弱性説明
LangChain is a framework for building LLM-powered applications. Prior to version 1.1.8, a redirect-based Server-Side Request Forgery (SSRF) bypass exists in `RecursiveUrlLoader` in `@langchain/community`. The loader validates the initial URL but allows the underlying fetch to follow redirects automatically, which permits a transition from a safe public URL to an internal or metadata endpoint without revalidation. This is a bypass of the SSRF protections introduced in 1.1.14 (CVE-2026-26019). Users should upgrade to `@langchain/community` 1.1.18, which validates every redirect hop by disabling automatic redirects and re-validating `Location` targets before following them. In this version, automatic redirects are disabled (`redirect: "manual"`), each 3xx `Location` is resolved and validated with `validateSafeUrl()` before the next request, and a maximum redirect limit prevents infinite loops.
CVSS情報
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N
脆弱性タイプ
服务端请求伪造(SSRF)
脆弱性タイトル
LangChain.js 代码问题漏洞
脆弱性説明
LangChain.js是LangChain开源的一个构建上下文感知推理应用程序。 LangChain.js 1.1.8之前版本存在代码问题漏洞,该漏洞源于RecursiveUrlLoader允许底层获取自动跟随重定向,可能导致服务端请求伪造攻击绕过。
CVSS情報
N/A
脆弱性タイプ
N/A