Vulnerability CVE-2021-43831


Published: 2021-12-15

Description:
Gradio is an open source framework for building interactive machine learning models and demos. In versions prior to 2.5.0 there is a vulnerability that affects anyone who creates and publicly shares Gradio interfaces. File paths are not restricted and users who receive a Gradio link can access any files on the host computer if they know the file names or file paths. This is limited only by the host operating system. Paths are opened in read only mode. The problem has been patched in gradio 2.5.0.

Type:

CWE-22

(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))

CVSS2 => (AV:N/AC:M/Au:S/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
3.5/10
2.9/10
6.8/10
Exploit range
Attack complexity
Authentication
Remote
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Gradio project -> Gradio 

 References:
https://github.com/gradio-app/gradio/commit/41bd3645bdb616e1248b2167ca83636a2653f781
https://github.com/gradio-app/gradio/security/advisories/GHSA-rhq2-3vr9-6mcr

Copyright 2024, cxsecurity.com

 

Back to Top