logo

CVE-2024-47168 gradio

Package

Manager: pip
Name: gradio
Vulnerable Version: >=0 <4.44.0

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.0006 pctl0.19048

Details

In Gradio, the `enable_monitoring` flag set to `False` does not disable monitoring ### Impact What kind of vulnerability is it? Who is impacted? This vulnerability involves data exposure due to the enable_monitoring flag not properly disabling monitoring when set to False. Even when monitoring is supposedly disabled, an attacker or unauthorized user can still access the monitoring dashboard by directly requesting the /monitoring endpoint. This means that sensitive application analytics may still be exposed, particularly in environments where monitoring is expected to be disabled. Users who set enable_monitoring=False to prevent unauthorized access to monitoring data are impacted. ### Patches Yes, please upgrade to gradio>=4.44 to address this issue.

Metadata

Created: 2024-10-10T22:02:30Z
Modified: 2025-01-21T17:56:54Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-hm3c-93pg-4cxw/GHSA-hm3c-93pg-4cxw.json
CWE IDs: ["CWE-670"]
Alternative ID: GHSA-hm3c-93pg-4cxw
Finding: F164
Auto approve: 1