Show filters
34 Total Results
Displaying 21-30 of 34
Sort by:
Attacker Value
Unknown

CVE-2024-1183

Disclosure Date: April 16, 2024 (last updated April 16, 2024)
An SSRF (Server-Side Request Forgery) vulnerability exists in the gradio-app/gradio repository, allowing attackers to scan and identify open ports within an internal network. By manipulating the 'file' parameter in a GET request, an attacker can discern the status of internal ports based on the presence of a 'Location' header or a 'File not allowed' error in the response.
0
Attacker Value
Unknown

CVE-2024-1728

Disclosure Date: April 10, 2024 (last updated April 11, 2024)
gradio-app/gradio is vulnerable to a local file inclusion vulnerability due to improper validation of user-supplied input in the UploadButton component. Attackers can exploit this vulnerability to read arbitrary files on the filesystem, such as private SSH keys, by manipulating the file path in the request to the `/queue/join` endpoint. This issue could potentially lead to remote code execution. The vulnerability is present in the handling of file upload paths, allowing attackers to redirect file uploads to unintended locations on the server.
0
Attacker Value
Unknown

CVE-2024-1729

Disclosure Date: March 29, 2024 (last updated April 16, 2024)
A timing attack vulnerability exists in the gradio-app/gradio repository, specifically within the login function in routes.py. The vulnerability arises from the use of a direct comparison operation (`app.auth[username] == password`) to validate user credentials, which can be exploited to guess passwords based on response times. Successful exploitation of this vulnerability could allow an attacker to bypass authentication mechanisms and gain unauthorized access.
0
Attacker Value
Unknown

CVE-2024-1540

Disclosure Date: March 27, 2024 (last updated April 16, 2024)
A command injection vulnerability exists in the deploy+test-visual.yml workflow of the gradio-app/gradio repository, due to improper neutralization of special elements used in a command. This vulnerability allows attackers to execute unauthorized commands, potentially leading to unauthorized modification of the base repository or secrets exfiltration. The issue arises from the unsafe handling of GitHub context information within a `run` operation, where expressions inside `${{ }}` are evaluated and substituted before script execution. Remediation involves setting untrusted input values to intermediate environment variables to prevent direct influence on script generation.
0
Attacker Value
Unknown

CVE-2024-2206

Disclosure Date: March 27, 2024 (last updated April 16, 2024)
An SSRF vulnerability exists in the gradio-app/gradio due to insufficient validation of user-supplied URLs in the `/proxy` route. Attackers can exploit this vulnerability by manipulating the `self.replica_urls` set through the `X-Direct-Url` header in requests to the `/` and `/config` routes, allowing the addition of arbitrary URLs for proxying. This flaw enables unauthorized proxying of requests and potential access to internal endpoints within the Hugging Face space. The issue arises from the application's inadequate checking of safe URLs in the `build_proxy_request` function.
0
Attacker Value
Unknown

CVE-2024-1727

Disclosure Date: March 21, 2024 (last updated April 16, 2024)
A Cross-Site Request Forgery (CSRF) vulnerability in gradio-app/gradio allows attackers to upload multiple large files to a victim's system if they are running Gradio locally. By crafting a malicious HTML page that triggers an unauthorized file upload to the victim's server, an attacker can deplete the system's disk space, potentially leading to a denial of service. This issue affects the file upload functionality as implemented in gradio/routes.py.
0
Attacker Value
Unknown

CVE-2024-0964

Disclosure Date: February 05, 2024 (last updated February 14, 2024)
A local file include could be remotely triggered in Gradio due to a vulnerable user-supplied JSON value in an API request.
Attacker Value
Unknown

CVE-2023-51449

Disclosure Date: December 22, 2023 (last updated January 10, 2024)
Gradio is an open-source Python package that allows you to quickly build a demo or web application for your machine learning model, API, or any arbitary Python function. Versions of `gradio` prior to 4.11.0 contained a vulnerability in the `/file` route which made them susceptible to file traversal attacks in which an attacker could access arbitrary files on a machine running a Gradio app with a public URL (e.g. if the demo was created with `share=True`, or on Hugging Face Spaces) if they knew the path of files to look for. This issue has been patched in version 4.11.0.
Attacker Value
Unknown

CVE-2023-6572

Disclosure Date: December 14, 2023 (last updated February 08, 2024)
Command Injection in GitHub repository gradio-app/gradio prior to main.
Attacker Value
Unknown

CVE-2023-41626

Disclosure Date: September 15, 2023 (last updated October 08, 2023)
Gradio v3.27.0 was discovered to contain an arbitrary file upload vulnerability via the /upload interface.