Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:47463
HistoryJun 11, 2024 - 6:08 a.m.

Local File Inclusion (LFI)

2024-06-1106:08:58
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
local file inclusion
input validation
postprocess
json parsing
arbitrary files
remote system
software security

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.2%

gradio is vulnerable to Local File Inclusion (LFI). The vulnerability is due to improper input validation in the postprocess() function within json_component.py, where a user-controlled string is parsed as JSON which can be exploited to read arbitrary files on the remote system.

CPENameOperatorVersion
gradiole4.31.2
gradiole4.31.2

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.2%