Gradio is an open-source Python package designed for quick prototyping. This vulnerability involves a **race condition** in the `update_root_in_config` function, allowing an attacker to modify the `root` URL used by the Gradio frontend to communicate with the backend. By exploiting this flaw, an attacker can redirect user traffic to a malicious server. This could lead to the interception of sensitive data such as authentication credentials or uploaded files. This impacts all users who connect to a Gradio server, especially those exposed to the internet, where malicious actors could exploit this race condition. Users are advised to upgrade to `gradio>=5` to address this issue. There are no known workarounds for this issue.
Metrics
Affected Vendors & Products
References
History
Thu, 17 Oct 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:* | |
Metrics |
cvssV3_1
|
Fri, 11 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gradio Project
Gradio Project gradio |
|
CPEs | cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:*:*:* | |
Vendors & Products |
Gradio Project
Gradio Project gradio |
|
Metrics |
ssvc
|
Thu, 10 Oct 2024 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Gradio is an open-source Python package designed for quick prototyping. This vulnerability involves a **race condition** in the `update_root_in_config` function, allowing an attacker to modify the `root` URL used by the Gradio frontend to communicate with the backend. By exploiting this flaw, an attacker can redirect user traffic to a malicious server. This could lead to the interception of sensitive data such as authentication credentials or uploaded files. This impacts all users who connect to a Gradio server, especially those exposed to the internet, where malicious actors could exploit this race condition. Users are advised to upgrade to `gradio>=5` to address this issue. There are no known workarounds for this issue. | |
Title | Race condition in update_root_in_config may redirect user traffic in Gradio | |
Weaknesses | CWE-362 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-10-10T22:15:05.594Z
Updated: 2024-10-11T15:17:49.588Z
Reserved: 2024-10-04T16:00:09.629Z
Link: CVE-2024-47870
Vulnrichment
Updated: 2024-10-11T15:17:45.625Z
NVD
Status : Analyzed
Published: 2024-10-10T23:15:03.070
Modified: 2024-10-17T16:57:02.283
Link: CVE-2024-47870
Redhat
No data.