CVE-2024-4325

A Server-Side Request Forgery (SSRF) vulnerability exists in the gradio-app/gradio version 4.21.0, specifically within the `/queue/join` endpoint and the `save_url_to_cache` function. The vulnerability arises when the `path` value, obtained from the user and expected to be a URL, is used to make an HTTP request without sufficient validation checks. This flaw allows an attacker to send crafted requests that could lead to unauthorized access to the local network or the AWS metadata endpoint, thereby compromising the security of internal servers.
References
Link Resource
https://huntr.com/bounties/b34f084b-7d14-4f00-bc10-048a3a5aaf88 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*

History

09 Oct 2024, 16:04

Type Values Removed Values Added
First Time Gradio Project
Gradio Project gradio
CPE cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.6
References () https://huntr.com/bounties/b34f084b-7d14-4f00-bc10-048a3a5aaf88 - () https://huntr.com/bounties/b34f084b-7d14-4f00-bc10-048a3a5aaf88 - Exploit, Third Party Advisory

06 Jun 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-06 18:15

Updated : 2024-10-09 16:04


NVD link : CVE-2024-4325

Mitre link : CVE-2024-4325


JSON object : View

Products Affected

gradio_project

  • gradio
CWE
CWE-918

Server-Side Request Forgery (SSRF)