Логотип exploitDog
bind:CVE-2024-10624
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-10624

Количество 2

Количество 2

nvd логотип

CVE-2024-10624

11 месяцев назад

A Regular Expression Denial of Service (ReDoS) vulnerability exists in the gradio-app/gradio repository, affecting the gr.Datetime component. The affected version is git commit 98cbcae. The vulnerability arises from the use of a regular expression `^(?:\s*now\s*(?:-\s*(\d+)\s*([dmhs]))?)?\s*$` to process user input. In Python's default regex engine, this regular expression can take polynomial time to match certain crafted inputs. An attacker can exploit this by sending a crafted HTTP request, causing the gradio process to consume 100% CPU and potentially leading to a Denial of Service (DoS) condition on the server.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-rvgh-pr46-x7gg

11 месяцев назад

Gradio Vulnerable to Denial of Service (DoS) via Crafted HTTP Request

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-10624

A Regular Expression Denial of Service (ReDoS) vulnerability exists in the gradio-app/gradio repository, affecting the gr.Datetime component. The affected version is git commit 98cbcae. The vulnerability arises from the use of a regular expression `^(?:\s*now\s*(?:-\s*(\d+)\s*([dmhs]))?)?\s*$` to process user input. In Python's default regex engine, this regular expression can take polynomial time to match certain crafted inputs. An attacker can exploit this by sending a crafted HTTP request, causing the gradio process to consume 100% CPU and potentially leading to a Denial of Service (DoS) condition on the server.

CVSS3: 7.5
1%
Низкий
11 месяцев назад
github логотип
GHSA-rvgh-pr46-x7gg

Gradio Vulnerable to Denial of Service (DoS) via Crafted HTTP Request

CVSS3: 7.5
1%
Низкий
11 месяцев назад

Уязвимостей на страницу