logo

CVE-2024-2206 gradio

Package

Manager: pip
Name: gradio
Vulnerable Version: >=0 <4.18.0

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L

EPSS: 0.00131 pctl0.334

Details

gradio Server-Side Request Forgery vulnerability An SSRF vulnerability exists in the gradio-app/gradio due to insufficient validation of user-supplied URLs in the `/proxy` route. Attackers can exploit this vulnerability by manipulating the `self.replica_urls` set through the `X-Direct-Url` header in requests to the `/` and `/config` routes, allowing the addition of arbitrary URLs for proxying. This flaw enables unauthorized proxying of requests and potential access to internal endpoints within the Hugging Face space. The issue arises from the application's inadequate checking of safe URLs in the `build_proxy_request` function.

Metadata

Created: 2024-03-27T03:31:16Z
Modified: 2024-04-16T15:51:15Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/03/GHSA-r364-m2j9-mf4h/GHSA-r364-m2j9-mf4h.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-r364-m2j9-mf4h
Finding: F100
Auto approve: 1