Gradio is an open-source Python package designed for quick prototyping. This vulnerability is related to **CORS origin validation**, where the Gradio server fails to validate the request origin when a cookie is present. This allows an attacker’s website to make unauthorized requests to a local Gradio server. Potentially, attackers can upload files, steal authentication tokens, and access user data if the victim visits a malicious website while logged into Gradio. This impacts users who have deployed Gradio locally and use basic authentication. Users are advised to upgrade to `gradio>4.44` to address this issue. As a workaround, users can manually enforce stricter CORS origin validation by modifying the `CustomCORSMiddleware` class in their local Gradio server code. Specifically, they can bypass the condition that skips CORS validation for requests containing cookies to prevent potential exploitation.
Metrics
Affected Vendors & Products
References
History
Thu, 17 Oct 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:* | |
Metrics |
cvssV3_1
|
Fri, 11 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gradio Project
Gradio Project gradio |
|
CPEs | cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:*:*:* | |
Vendors & Products |
Gradio Project
Gradio Project gradio |
|
Metrics |
ssvc
|
Thu, 10 Oct 2024 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Gradio is an open-source Python package designed for quick prototyping. This vulnerability is related to **CORS origin validation**, where the Gradio server fails to validate the request origin when a cookie is present. This allows an attacker’s website to make unauthorized requests to a local Gradio server. Potentially, attackers can upload files, steal authentication tokens, and access user data if the victim visits a malicious website while logged into Gradio. This impacts users who have deployed Gradio locally and use basic authentication. Users are advised to upgrade to `gradio>4.44` to address this issue. As a workaround, users can manually enforce stricter CORS origin validation by modifying the `CustomCORSMiddleware` class in their local Gradio server code. Specifically, they can bypass the condition that skips CORS validation for requests containing cookies to prevent potential exploitation. | |
Title | CORS origin validation is not performed when the request has a cookie in Gradio | |
Weaknesses | CWE-285 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-10-10T21:53:51.940Z
Updated: 2024-10-11T15:24:05.733Z
Reserved: 2024-09-17T17:42:37.030Z
Link: CVE-2024-47084
Vulnrichment
Updated: 2024-10-11T15:23:59.398Z
NVD
Status : Analyzed
Published: 2024-10-10T22:15:10.263
Modified: 2024-10-17T16:30:59.790
Link: CVE-2024-47084
Redhat
No data.