logo

CVE-2024-4325 gradio

Package

Manager: pip
Name: gradio
Vulnerable Version: >=0 <=4.36.0

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.42757 pctl0.9739

Details

Server-Side Request Forgery in gradio A Server-Side Request Forgery (SSRF) vulnerability exists in the gradio-app/gradio and was discovered in version 4.21.0, specifically within the `/queue/join` endpoint and the `save_url_to_cache` function. The vulnerability arises when the `path` value, obtained from the user and expected to be a URL, is used to make an HTTP request without sufficient validation checks. This flaw allows an attacker to send crafted requests that could lead to unauthorized access to the local network or the AWS metadata endpoint, thereby compromising the security of internal servers.

Metadata

Created: 2024-06-06T18:30:58Z
Modified: 2024-06-06T22:06:58Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-973g-55hp-3frw/GHSA-973g-55hp-3frw.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-973g-55hp-3frw
Finding: F100
Auto approve: 1