Lucene search

K
githubGitHub Advisory DatabaseGHSA-3X5J-9VWR-8RR5
HistoryFeb 23, 2023 - 10:10 p.m.

Update share links to use FRP instead of SSH tunneling

2023-02-2322:10:19
CWE-798
GitHub Advisory Database
github.com
58
gradio
share links
vulnerability
frp
ssh tunneling
upgrade

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

54.1%

Impact

This is a vulnerability which affects anyone using Gradio’s share links (i.e. creating a Gradio app and then setting share=True) with Gradio versions older than 3.13.1. In these older versions of Gradio, a private SSH key is sent to any user that connects to the Gradio machine, which means that a user could access other users’ shared Gradio demos. From there, other exploits are possible depending on the level of access/exposure the Gradio app provides.

Patches

The problem has been patched. Ideally, users should upgrade to gradio==3.19.1 or later where the FRP solution has been properly tested.

Credit

Credit to Greg Sadetsky and Samuel Tremblay-Cossette for alerting the team

Affected configurations

Vulners
Node
gradio-appgradioRange<3.13.1
CPENameOperatorVersion
gradiolt3.13.1

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

54.1%

Related for GHSA-3X5J-9VWR-8RR5