Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m842-4qm8-7gpq

Опубликовано: 25 сент. 2024
Источник: github
Github: Прошло ревью
CVSS4: 9.2
CVSS3: 8.1

Описание

Gradio allows users to access arbitrary files

Impact

This vulnerability allows users of Gradio applications that have a public link (such as on Hugging Face Spaces) to access files on the machine hosting the Gradio application. This involves intercepting and modifying the network requests made by the Gradio app to the server.

Patches

Yes, the problem has been patched in Gradio version 4.19.2 or higher. We have no knowledge of this exploit being used against users of Gradio applications, but we encourage all users to upgrade to Gradio 4.19.2 or higher.

Fixed in: https://github.com/gradio-app/gradio/commit/16fbe9cd0cffa9f2a824a0165beb43446114eec7 CVE: https://nvd.nist.gov/vuln/detail/CVE-2024-1728

Пакеты

Наименование

gradio

pip
Затронутые версииВерсия исправления

< 4.19.2

4.19.2

EPSS

Процентиль: 99%
0.81897
Высокий

9.2 Critical

CVSS4

8.1 High

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 7.5
nvd
почти 2 года назад

gradio-app/gradio is vulnerable to a local file inclusion vulnerability due to improper validation of user-supplied input in the UploadButton component. Attackers can exploit this vulnerability to read arbitrary files on the filesystem, such as private SSH keys, by manipulating the file path in the request to the `/queue/join` endpoint. This issue could potentially lead to remote code execution. The vulnerability is present in the handling of file upload paths, allowing attackers to redirect file uploads to unintended locations on the server.

EPSS

Процентиль: 99%
0.81897
Высокий

9.2 Critical

CVSS4

8.1 High

CVSS3

Дефекты

CWE-22