CVE-2024-4325 – gradio
Package
Manager: pip
Name: gradio
Vulnerable Version: >=0 <=4.36.0
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.42757 pctl0.9739
Details
Server-Side Request Forgery in gradio A Server-Side Request Forgery (SSRF) vulnerability exists in the gradio-app/gradio and was discovered in version 4.21.0, specifically within the `/queue/join` endpoint and the `save_url_to_cache` function. The vulnerability arises when the `path` value, obtained from the user and expected to be a URL, is used to make an HTTP request without sufficient validation checks. This flaw allows an attacker to send crafted requests that could lead to unauthorized access to the local network or the AWS metadata endpoint, thereby compromising the security of internal servers.
Metadata
Created: 2024-06-06T18:30:58Z
Modified: 2024-06-06T22:06:58Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-973g-55hp-3frw/GHSA-973g-55hp-3frw.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-973g-55hp-3frw
Finding: F100
Auto approve: 1