CVE-2024-10624 – gradio
Package
Manager: pip
Name: gradio
Vulnerable Version: >=4.38.0 <=5.0.0-beta.2
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00265 pctl0.49784
Details
Gradio Vulnerable to Denial of Service (DoS) via Crafted HTTP Request A Regular Expression Denial of Service (ReDoS) vulnerability exists in the gradio-app/gradio repository, affecting the gr.Datetime component. The affected version is git commit 98cbcae. The vulnerability arises from the use of a regular expression `^(?:\s*now\s*(?:-\s*(\d+)\s*([dmhs]))?)?\s*$` to process user input. In Python's default regex engine, this regular expression can take polynomial time to match certain crafted inputs. An attacker can exploit this by sending a crafted HTTP request, causing the gradio process to consume 100% CPU and potentially leading to a Denial of Service (DoS) condition on the server.
Metadata
Created: 2025-03-20T12:32:39Z
Modified: 2025-03-20T20:39:00Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-rvgh-pr46-x7gg/GHSA-rvgh-pr46-x7gg.json
CWE IDs: ["CWE-400"]
Alternative ID: GHSA-rvgh-pr46-x7gg
Finding: F002
Auto approve: 1