CVE-2024-1728

Scores

EPSS

0.868high86.8%
0%20%40%60%80%100%

Percentile: 86.8%

CVSS

7.5high3.x
0246810

CVSS Score: 7.5/10

All CVSS Scores

CVSS 3.x
7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Description

gradio-app/gradio is vulnerable to a local file inclusion vulnerability due to improper validation of user-supplied input in the UploadButton component. Attackers can exploit this vulnerability to read arbitrary files on the filesystem, such as private SSH keys, by manipulating the file path in the request to the /queue/join endpoint. This issue could potentially lead to remote code execution. The vulnerability is present in the handling of file upload paths, allowing attackers to redirect file uploads to unintended locations on the server.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-22

Exploits

Exploit ID: CVE-2024-1728

Source: github-poc

URL: https://github.com/yuanmeng-MINGI/CVE-2024-1728

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: gradio

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*",      "versionEndExcluding": "4.19.2",      "versionStartIncluding": "4.18.0",      "vulnerable": t...

Source: nvd

End of list