-
Notifications
You must be signed in to change notification settings - Fork 2.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix[SSRF]: Arbitrary File Read Vulnerability #5541
base: main
Are you sure you want to change the base?
Conversation
- Check if the URL has a valid HTTP or HTTPS protocol Vulnerability: https://huntr.com/bounties/23f45984-7336-48d8-a373-75b39bcd6367 Vulnerability Reporter: https://github.com/evrenyal
The latest updates on your projects. Learn more about Vercel for Git ↗︎
|
I responded on the original bug - this is a thin proxy over Playwright, and this issue feels like a feature of the URI spec? What if someone is using this feature? Wouldn't it be more suitable to open a PR on Playwright? |
We offer Playwright as a document loader in Langchain. I think we should take security measures for the codes we write, at least as much as we can. |
Seems like a bug on Playwright to me. Perhaps there's a setting on their end? |
SSRF is mentioned in the Langchain Python library. Instead of a url controller like in the commit, it would be useful to provide information like in the link. |
Yeah I'm fine with adding a docstring, slightly more wary about making a code change (again, this is a proxy/translation layer on top of Playwright). |
Great, I'm going to delete the code in the commit and add docstring. |
Vulnerability:huntr
Found By: evrenyal
Vulnerability Details
Description
Langchain “PlaywrightWebBaseLoader” allows reading arbitrary files from the server.
Proof Of Concept
Response :
Impact
An attacker can use the “file://” url scheme and retrieve the content of arbitrary files on the system, that leads to sensitive information exposure.