Skip to content

gradio Server-Side Request Forgery vulnerability

High severity GitHub Reviewed Published Mar 27, 2024 to the GitHub Advisory Database • Updated Apr 16, 2024

Package

pip gradio (pip)

Affected versions

< 4.18.0

Patched versions

4.18.0

Description

An SSRF vulnerability exists in the gradio-app/gradio due to insufficient validation of user-supplied URLs in the /proxy route. Attackers can exploit this vulnerability by manipulating the self.replica_urls set through the X-Direct-Url header in requests to the / and /config routes, allowing the addition of arbitrary URLs for proxying. This flaw enables unauthorized proxying of requests and potential access to internal endpoints within the Hugging Face space. The issue arises from the application's inadequate checking of safe URLs in the build_proxy_request function.

References

Published by the National Vulnerability Database Mar 27, 2024
Published to the GitHub Advisory Database Mar 27, 2024
Reviewed Mar 27, 2024
Last updated Apr 16, 2024

Severity

High
7.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

EPSS score

0.043%
(10th percentile)

Weaknesses

CVE ID

CVE-2024-2206

GHSA ID

GHSA-r364-m2j9-mf4h

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.