diff --git a/http/cves/2021/CVE-2021-43831.yaml b/http/cves/2021/CVE-2021-43831.yaml index 85711779f2..d231cceb03 100644 --- a/http/cves/2021/CVE-2021-43831.yaml +++ b/http/cves/2021/CVE-2021-43831.yaml @@ -14,15 +14,19 @@ info: - https://github.com/gradio-app/gradio/security/advisories/GHSA-rhq2-3vr9-6mcr - https://github.com/gradio-app/gradio/commit/41bd3645bdb616e1248b2167ca83636a2653f781 classification: - cvss-metrics: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L - cvss-score: 8.3 + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N + cvss-score: 7.7 cve-id: CVE-2021-43831 + cwe-id: CWE-22 + epss-score: 0.00063 + epss-percentile: 0.26511 cpe: cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:* metadata: - vendor: Gradio - product: Gradio + vendor: gradio_project + product: gradio + framework: python shodan-query: title:"Gradio" - tags: cve,cve2021,lfi,Gradio,traversal + tags: cve,cve2021,lfi,gradio http: - method: GET @@ -35,18 +39,14 @@ http: - /windows/win.ini stop-at-first-match: true - matchers-condition: or + matchers-condition: and matchers: - - type: dsl - dsl: - - "regex('root:.*:0:0:', body)" - - "status_code == 200" - condition: and + - type: regex + regex: + - "root:.*:0:0:" + - "\\[(font|extension|file)s\\]" + condition: or - - type: dsl - dsl: - - "contains(body, 'bit app support')" - - "contains(body, 'fonts')" - - "contains(body, 'extensions')" - - "status_code == 200" - condition: and \ No newline at end of file + - type: status + status: + - 200