Lucene search

K
githubGitHub Advisory DatabaseGHSA-R364-M2J9-MF4H
HistoryMar 27, 2024 - 3:31 a.m.

gradio Server-Side Request Forgery vulnerability

2024-03-2703:31:16
CWE-918
GitHub Advisory Database
github.com
9
vulnerability
server-side request forgery
/proxy route
internal endpoints
software

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

0.0004 Low

EPSS

Percentile

9.1%

An SSRF vulnerability exists in the gradio-app/gradio due to insufficient validation of user-supplied URLs in the /proxy route. Attackers can exploit this vulnerability by manipulating the self.replica_urls set through the X-Direct-Url header in requests to the / and /config routes, allowing the addition of arbitrary URLs for proxying. This flaw enables unauthorized proxying of requests and potential access to internal endpoints within the Hugging Face space. The issue arises from the application’s inadequate checking of safe URLs in the build_proxy_request function.

Affected configurations

Vulners
Node
gradio_projectgradioRange<4.18.0python
CPENameOperatorVersion
gradiolt4.18.0

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

0.0004 Low

EPSS

Percentile

9.1%

Related for GHSA-R364-M2J9-MF4H