NVD Vulnerability Detail
Search Exploit, PoC
CVE-2024-47870
Summary

Gradio is an open-source Python package designed for quick prototyping. This vulnerability involves a **race condition** in the `update_root_in_config` function, allowing an attacker to modify the `root` URL used by the Gradio frontend to communicate with the backend. By exploiting this flaw, an attacker can redirect user traffic to a malicious server. This could lead to the interception of sensitive data such as authentication credentials or uploaded files. This impacts all users who connect to a Gradio server, especially those exposed to the internet, where malicious actors could exploit this race condition. Users are advised to upgrade to `gradio>=5` to address this issue. There are no known workarounds for this issue.

Publication Date Oct. 11, 2024, 8:15 a.m.
Registration Date Oct. 11, 2024, noon
Last Update Oct. 18, 2024, 1:57 a.m.
CVSS3.1 : HIGH
スコア 8.1
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR) 不要
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C)
完全性への影響(I)
可用性への影響(A)
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:* 5.0.0
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
Gradio project の Python 用 Gradio における競合状態に関する脆弱性
Title Gradio project の Python 用 Gradio における競合状態に関する脆弱性
Summary

Gradio project の Python 用 Gradio には、競合状態に関する脆弱性が存在します。

Possible impacts 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。
Solution

参考情報を参照して適切な対策を実施してください。

Publication Date Oct. 10, 2024, midnight
Registration Date Oct. 18, 2024, 12:41 p.m.
Last Update Oct. 18, 2024, 12:41 p.m.
Affected System
Gradio project
Gradio 5.0.0 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
その他
Change Log
No Changed Details Date of change
1 [2024年10月18日]   掲載 Oct. 18, 2024, 12:25 p.m.