logo

CVE-2023-34239 gradio

Package

Manager: pip
Name: gradio
Vulnerable Version: >=0 <3.34.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

EPSS: 0.0021 pctl0.43436

Details

Gradio vulnerable to arbitrary file read and proxying of arbitrary URLs ### Impact There are two separate security vulnerabilities here: (1) a security vulnerability that allows users to read arbitrary files on the machines that are running shared Gradio apps (2) the ability of users to use machines that are sharing Gradio apps to proxy arbitrary URLs ### Patches Both problems have been solved, please upgrade `gradio` to `3.34.0` or higher ### Workarounds Not possible to workaround except by taking down any shared Gradio apps ### References Relevant PRs: * https://github.com/gradio-app/gradio/pull/4406 * https://github.com/gradio-app/gradio/pull/4370

Metadata

Created: 2023-06-09T22:51:19Z
Modified: 2024-09-20T21:19:30Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/06/GHSA-3qqg-pgqq-3695/GHSA-3qqg-pgqq-3695.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-3qqg-pgqq-3695
Finding: F184
Auto approve: 1