ghsa-973g-55hp-3frw
Vulnerability from github
Published
2024-06-06 18:30
Modified
2024-06-06 22:06
Severity ?
Summary
Server-Side Request Forgery in gradio
Details
A Server-Side Request Forgery (SSRF) vulnerability exists in the gradio-app/gradio and was discovered in version 4.21.0, specifically within the /queue/join
endpoint and the save_url_to_cache
function. The vulnerability arises when the path
value, obtained from the user and expected to be a URL, is used to make an HTTP request without sufficient validation checks. This flaw allows an attacker to send crafted requests that could lead to unauthorized access to the local network or the AWS metadata endpoint, thereby compromising the security of internal servers.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "gradio" }, "ranges": [ { "events": [ { "introduced": "0" }, { "last_affected": "4.36.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-4325" ], "database_specific": { "cwe_ids": [ "CWE-918" ], "github_reviewed": true, "github_reviewed_at": "2024-06-06T22:06:57Z", "nvd_published_at": "2024-06-06T18:15:18Z", "severity": "HIGH" }, "details": "A Server-Side Request Forgery (SSRF) vulnerability exists in the gradio-app/gradio and was discovered in version 4.21.0, specifically within the `/queue/join` endpoint and the `save_url_to_cache` function. The vulnerability arises when the `path` value, obtained from the user and expected to be a URL, is used to make an HTTP request without sufficient validation checks. This flaw allows an attacker to send crafted requests that could lead to unauthorized access to the local network or the AWS metadata endpoint, thereby compromising the security of internal servers.", "id": "GHSA-973g-55hp-3frw", "modified": "2024-06-06T22:06:58Z", "published": "2024-06-06T18:30:58Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4325" }, { "type": "WEB", "url": "https://github.com/gradio-app/gradio/pull/8301" }, { "type": "PACKAGE", "url": "https://github.com/gradio-app/gradio" }, { "type": "WEB", "url": "https://huntr.com/bounties/b34f084b-7d14-4f00-bc10-048a3a5aaf88" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "type": "CVSS_V3" } ], "summary": "Server-Side Request Forgery in gradio" }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.