CVE-2024-2206 – gradio
Package
Manager: pip
Name: gradio
Vulnerable Version: >=0 <4.18.0
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
EPSS: 0.00131 pctl0.334
Details
gradio Server-Side Request Forgery vulnerability An SSRF vulnerability exists in the gradio-app/gradio due to insufficient validation of user-supplied URLs in the `/proxy` route. Attackers can exploit this vulnerability by manipulating the `self.replica_urls` set through the `X-Direct-Url` header in requests to the `/` and `/config` routes, allowing the addition of arbitrary URLs for proxying. This flaw enables unauthorized proxying of requests and potential access to internal endpoints within the Hugging Face space. The issue arises from the application's inadequate checking of safe URLs in the `build_proxy_request` function.
Metadata
Created: 2024-03-27T03:31:16Z
Modified: 2024-04-16T15:51:15Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/03/GHSA-r364-m2j9-mf4h/GHSA-r364-m2j9-mf4h.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-r364-m2j9-mf4h
Finding: F100
Auto approve: 1