Miggo Logo

CVE-2024-5998:
LangChain pickle deserialization of untrusted data

5.2

CVSS Score
3.1

Basic Information

EPSS Score
0.4145%
Published
9/17/2024
Updated
11/18/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
langchain-communitypip< 0.2.40.2.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability explicitly references FAISS.deserialize_from_bytes as the entry point for unsafe deserialization. The commit diff shows this function previously lacked safeguards against untrusted pickle data, directly using pickle.loads(serialized). The CWE-502 alignment and the patch's introduction of an opt-in parameter confirm the function's role in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* vuln*r**ility in t** `**ISS.**s*ri*liz*_*rom_*yt*s` *un*tion o* l*n****in-*i/l*n****in *llows *or pi*kl* **s*ri*liz*tion o* untrust** **t*. T*is **n l*** to t** *x**ution o* *r*itr*ry *omm*n*s vi* t** `os.syst*m` *un*tion. T** issu* *****ts v*rsion

Reasoning

T** vuln*r**ility *xpli*itly r***r*n**s **ISS.**s*ri*liz*_*rom_*yt*s *s t** *ntry point *or uns*** **s*ri*liz*tion. T** *ommit *i** s*ows t*is *un*tion pr*viously l**k** s****u*r*s ***inst untrust** pi*kl* **t*, *ir**tly usin* pi*kl*.lo**s(s*ri*liz**