A Server-Side Request Forgery (SSRF) vulnerability exists in the gradio-app/gradio version 4.21.0, specifically within the `/queue/join` endpoint and the `save_url_to_cache` function. The vulnerability arises when the `path` value, obtained from the user and expected to be a URL, is used to make an HTTP request without sufficient validation checks. This flaw allows an attacker to send crafted requests that could lead to unauthorized access to the local network or the AWS metadata endpoint, thereby compromising the security of internal servers.
References
Link | Resource |
---|---|
https://huntr.com/bounties/b34f084b-7d14-4f00-bc10-048a3a5aaf88 | Exploit Third Party Advisory |
Configurations
History
09 Oct 2024, 16:04
Type | Values Removed | Values Added |
---|---|---|
First Time |
Gradio Project
Gradio Project gradio |
|
CPE | cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:* | |
References | () https://huntr.com/bounties/b34f084b-7d14-4f00-bc10-048a3a5aaf88 - Exploit, Third Party Advisory |
07 Jun 2024, 14:56
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 Jun 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-06 18:15
Updated : 2024-10-09 16:04
NVD link : CVE-2024-4325
Mitre link : CVE-2024-4325
CVE.ORG link : CVE-2024-4325
JSON object : View
Products Affected
gradio_project
- gradio
CWE
CWE-918
Server-Side Request Forgery (SSRF)