Lucene search

K
githubGitHub Advisory DatabaseGHSA-6QM2-WPXQ-7QH2
HistoryDec 21, 2023 - 6:24 p.m.

Gradio makes the `/file` secure against file traversal and server-side request forgery attacks

2023-12-2118:24:28
CWE-22
GitHub Advisory Database
github.com
9
gradio
file route
security
vulnerability
file traversal
ssrf
fix
version 4.11.0

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.5 High

AI Score

Confidence

Low

0.031 Low

EPSS

Percentile

91.1%

Older versions of gradio contained a vulnerability in the /file route which made them susceptible to file traversal attacks in which an attacker could access arbitrary files on a machine running a Gradio app with a public URL (e.g. if the demo was created with share=True, or on Hugging Face Spaces) if they knew the path of files to look for.

This was not possible through regular URLs passed into a browser, but it was possible through the use of programmatic tools such as curl with the --pass-as-is flag.

Furthermore, the /file route in Gradio apps also contained a vulnerability that made it possible to use it for SSRF attacks.

Both of these vulnerabilities have been fixed in gradio==4.11.0

Affected configurations

Vulners
Node
gradio-appgradioRange<4.11.0
CPENameOperatorVersion
gradiolt4.11.0

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.5 High

AI Score

Confidence

Low

0.031 Low

EPSS

Percentile

91.1%