CVE-2024-9277: Inefficient Regular Expression Complexity in langflow
3.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.60671%
CWE
Published
9/27/2024
Updated
10/1/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
langflow | pip | <= 1.0.18 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
- The vulnerability disclosure explicitly references utils.py and manipulation of remaining_text.
- The code analysis shows extract_input_variables_from_prompt processes remaining_text using a regex in a loop.
- The regex pattern contains alternation and non-greedy quantifiers that create ambiguity, a known ReDoS risk pattern.
- The loop structure (modifying remaining_text after each match) combined with exponential regex complexity creates a denial-of-service vector.
- The user submission #410043 directly identifies this function as vulnerable through code analysis.