Server-side Request Forgery (SSRF) Affecting gradio package, versions [,4.11.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
6.76% (95th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-GRADIO-6137749
  • published21 Dec 2023
  • disclosed21 Dec 2023
  • creditUnknown

Introduced: 21 Dec 2023

CVE-2023-51449  (opens in a new tab)
CWE-22  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade gradio to version 4.11.0 or higher.

Overview

gradio is a Python library for easily interacting with trained machine learning models

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) or path traversal allowing arbitrary file reads, via the /file route. This is exploitable using e.g. the --path-as-is option to curl, but not from a browser.

CVSS Scores

version 3.1