← Retour aux CVEs
CVE-2024-9277
LOW3.5
Description
A vulnerability classified as problematic was found in Langflow up to 1.0.18. Affected by this vulnerability is an unknown functionality of the file \src\backend\base\langflow\interface\utils.py of the component HTTP POST Request Handler. The manipulation of the argument remaining_text leads to inefficient regular expression complexity. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Details CVE
Score CVSS v3.13.5
SeveriteLOW
Vecteur CVSSCVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Vecteur d'attaqueADJACENT_NETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie9/27/2024
Derniere modification6/5/2025
Sourcenvd
Observations honeypot0
Produits affectes
langflow:langflow
Faiblesses (CWE)
CWE-1333
References
https://rumbling-slice-eb0.notion.site/Remote-Redos-in-https-github-com-langflow-ai-langflow-067159ced0d5494e91b06071384969c4?pvs=4(cna@vuldb.com)
https://vuldb.com/?ctiid.278659(cna@vuldb.com)
https://vuldb.com/?id.278659(cna@vuldb.com)
https://vuldb.com/?submit.410043(cna@vuldb.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.