logo

CVE-2024-12217 gradio

Package

Manager: pip
Name: gradio
Vulnerable Version: >=0 <=5.0.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00061 pctl0.19291

Details

Gradio Path Traversal vulnerability A vulnerability in the gradio-app/gradio repository, version git 67e4044, allows for path traversal on Windows OS. The implementation of the blocked_path functionality, which is intended to disallow users from reading certain files, is flawed. Specifically, while the application correctly blocks access to paths like 'C:/tmp/secret.txt', it fails to block access when using NTFS Alternate Data Streams (ADS) syntax, such as 'C:/tmp/secret.txt::$DATA'. This flaw can lead to unauthorized reading of blocked file paths.

Metadata

Created: 2025-03-20T12:32:42Z
Modified: 2025-03-21T17:12:10Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-prpg-p95c-32fv/GHSA-prpg-p95c-32fv.json
CWE IDs: ["CWE-22", "CWE-41"]
Alternative ID: GHSA-prpg-p95c-32fv
Finding: F063
Auto approve: 1