GHSA-3x9g-xfj5-fq84 – gradio
Package
Manager: pip
Name: gradio
Vulnerable Version: <0
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVSS v4.0: N/A
EPSS: N/A pctlN/A
Details
Duplicate Advisory: Cross-Site Request Forgery in Gradio ## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-48cq-79qq-6f7x. this link is maintained to preserve external references. ## Original Description A Cross-Site Request Forgery gives attackers the ability to upload many large files to a victim, if they are running Gradio locally. To resolve this a PR tightening the CORS rules around Gradio applications has been submitted. In particular, it checks to see if the host header is localhost (or one of its aliases) and if so, it requires the origin header (if present) to be localhost (or one of its aliases) as well.
Metadata
Created: 2024-03-21T21:31:15Z
Modified: 2024-05-21T14:43:32Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/03/GHSA-3x9g-xfj5-fq84/GHSA-3x9g-xfj5-fq84.json
CWE IDs: ["CWE-352"]
Alternative ID: N/A
Finding: N/A
Auto approve: 0