Описание
Gradio vulnerable to arbitrary file read with File and UploadButton components
Summary
If File or UploadButton components are used as a part of Gradio application to preview file content, an attacker with access to the application might abuse these components to read arbitrary files from the application server.
Details
Consider the following application where a user can upload a file and preview its content:
If we run this application and make the following request (which attempts to read the /etc/passwd file)
Then this results in the following error on the server
This is expected. However, if we now remove the "meta":{"_type":"gradio.FileData"} from the request:
This doesn't cause an error and results in the content of /etc/passwd being shown in the response!
This works because Gradio relies on the processing_utils.async_move_files_to_cache to sanitize all incoming file paths in all inputs. This function performs the following operation
where client_utils.is_file_obj_with_meta is used as a filter which tells on which inputs to perform the _move_to_cache function (which also performs the allowed/disallowed check on the file path). The problem is that client_utils.is_file_obj_with_meta is not guaranteed to trigger for every input that contains a file path:
For example, as in the PoC, the file path won't be checked if the meta key is not present in the request or if _type is not gradio.FileData.
Then, the path remains under control of the attacker and is used to read a file in _process_single_file function in file.py and upload_button.py (and possibly other places)
PoC
As described above, run the following Gradio app
And make the following request
Impact
Arbitrary file read in specific Gradio applications that use File or UploadButton components to upload files and echo/preview the content to the user.
Пакеты
gradio
>= 5.0.0, < 5.5.0
5.5.0
Связанные уязвимости
Gradio is an open-source Python package designed to enable quick builds of a demo or web application. If File or UploadButton components are used as a part of Gradio application to preview file content, an attacker with access to the application might abuse these components to read arbitrary files from the application server. This issue has been addressed in release version 5.5.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.