Skip to content

Commit cff6c3d

Browse files
committed
added advisory
1 parent 78db497 commit cff6c3d

File tree

1 file changed

+29
-0
lines changed

1 file changed

+29
-0
lines changed

source/_posts/SSRF in Gradio.md

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
---
2+
title: "SSRF in Gradio"
3+
date: 2023-12-21
4+
tags:
5+
- "ssrf"
6+
- "dos"
7+
advisory: true
8+
origin: https://github.com/advisories/GHSA-6qm2-wpxq-7qh2
9+
cves:
10+
- CVE-2023-51449
11+
ghsas:
12+
- "GHSA-6qm2-wpxq-7qh2"
13+
---
14+
# Description
15+
Older versions of `gradio` contained a vulnerability in the `/file` route which made them susceptible to file traversal attacks in which an attacker could access arbitrary files on a machine running a Gradio app with a public URL (e.g. if the demo was created with `share=True`, or on Hugging Face Spaces) if they knew the path of files to look for.
16+
17+
This was not possible through regular URLs passed into a browser, but it was possible through the use of programmatic tools such as `curl` with the `--pass-as-is` flag.
18+
19+
Furthermore, the `/file` route in Gradio apps also contained a vulnerability that made it possible to use it for SSRF attacks.
20+
21+
# Explotation
22+
The exploitation of this vulnerability is highly context/infrastructure dependent. We found out that it is possible to DoS the gradio’s server simply by running the following request:
23+
`http://gradio-domain/file=http://gradio-domain`
24+
25+
# Mitigation
26+
Both of these vulnerabilities have been fixed in `gradio==4.11.0`
27+
28+
# References
29+
* [Github's Advisory](https://github.com/gradio-app/gradio/security/advisories/GHSA-6qm2-wpxq-7qh2)

0 commit comments

Comments
 (0)