Gradio is an open-source Python package that allows you to quickly build a demo or web application for your machine learning model, API, or any arbitary Python function. Versions of `gradio` prior to 4.11.0 contained a vulnerability in the `/file` route which made them susceptible to file traversal attacks in which an attacker could access arbitrary files on a machine running a Gradio app with a public URL (e.g. if the demo was created with `share=True`, or on Hugging Face Spaces) if they knew the path of files to look for. This issue has been patched in version 4.11.0.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-6qm2-wpxq-7qh2 Gradio makes the `/file` secure against file traversal and server-side request forgery attacks
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T22:32:09.953Z

Reserved: 2023-12-19T15:19:39.615Z

Link: CVE-2023-51449

cve-icon Vulnrichment

Updated: 2024-08-02T22:32:09.953Z

cve-icon NVD

Status : Modified

Published: 2023-12-22T21:15:09.000

Modified: 2024-11-21T08:38:08.513

Link: CVE-2023-51449

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses