Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r364-m2j9-mf4h

Опубликовано: 27 мар. 2024
Источник: github
Github: Прошло ревью
CVSS3: 7.3

Описание

gradio Server-Side Request Forgery vulnerability

An SSRF vulnerability exists in the gradio-app/gradio due to insufficient validation of user-supplied URLs in the /proxy route. Attackers can exploit this vulnerability by manipulating the self.replica_urls set through the X-Direct-Url header in requests to the / and /config routes, allowing the addition of arbitrary URLs for proxying. This flaw enables unauthorized proxying of requests and potential access to internal endpoints within the Hugging Face space. The issue arises from the application's inadequate checking of safe URLs in the build_proxy_request function.

Пакеты

Наименование

gradio

pip
Затронутые версииВерсия исправления

< 4.18.0

4.18.0

EPSS

Процентиль: 33%
0.00131
Низкий

7.3 High

CVSS3

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 6.5
nvd
почти 2 года назад

An SSRF vulnerability exists in the gradio-app/gradio due to insufficient validation of user-supplied URLs in the `/proxy` route. Attackers can exploit this vulnerability by manipulating the `self.replica_urls` set through the `X-Direct-Url` header in requests to the `/` and `/config` routes, allowing the addition of arbitrary URLs for proxying. This flaw enables unauthorized proxying of requests and potential access to internal endpoints within the Hugging Face space. The issue arises from the application's inadequate checking of safe URLs in the `build_proxy_request` function.

EPSS

Процентиль: 33%
0.00131
Низкий

7.3 High

CVSS3

Дефекты

CWE-918