Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xh2x-3mrm-fwqm

Опубликовано: 10 окт. 2024
Источник: github
Github: Прошло ревью
CVSS4: 8.8
CVSS3: 7

Описание

Gradio has a race condition in update_root_in_config may redirect user traffic

Impact

What kind of vulnerability is it? Who is impacted?

This vulnerability involves a race condition in the update_root_in_config function, allowing an attacker to modify the root URL used by the Gradio frontend to communicate with the backend. By exploiting this flaw, an attacker can redirect user traffic to a malicious server. This could lead to the interception of sensitive data such as authentication credentials or uploaded files. This impacts all users who connect to a Gradio server, especially those exposed to the internet, where malicious actors could exploit this race condition.

Patches

Yes, please upgrade to gradio>=5 to address this issue.

Пакеты

Наименование

gradio

pip
Затронутые версииВерсия исправления

< 5.0.0

5.0.0

EPSS

Процентиль: 34%
0.00141
Низкий

8.8 High

CVSS4

7 High

CVSS3

Дефекты

CWE-362

Связанные уязвимости

CVSS3: 8.1
nvd
больше 1 года назад

Gradio is an open-source Python package designed for quick prototyping. This vulnerability involves a **race condition** in the `update_root_in_config` function, allowing an attacker to modify the `root` URL used by the Gradio frontend to communicate with the backend. By exploiting this flaw, an attacker can redirect user traffic to a malicious server. This could lead to the interception of sensitive data such as authentication credentials or uploaded files. This impacts all users who connect to a Gradio server, especially those exposed to the internet, where malicious actors could exploit this race condition. Users are advised to upgrade to `gradio>=5` to address this issue. There are no known workarounds for this issue.

EPSS

Процентиль: 34%
0.00141
Низкий

8.8 High

CVSS4

7 High

CVSS3

Дефекты

CWE-362