CVE-2024-1561

Source
https://cve.org/CVERecord?id=CVE-2024-1561
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-1561.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-1561
Aliases
Published
2024-04-16T00:15:08.887Z
Modified
2026-02-11T01:56:57.203394Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in gradio-app/gradio, where the /component_server endpoint improperly allows the invocation of any method on a Component class with attacker-controlled arguments. Specifically, by exploiting the move_resource_to_block_cache() method of the Block class, an attacker can copy any file on the filesystem to a temporary directory and subsequently retrieve it. This vulnerability enables unauthorized local file read access, posing a significant risk especially when the application is exposed to the internet via launch(share=True), thereby allowing remote attackers to read files on the host machine. Furthermore, gradio apps hosted on huggingface.co are also affected, potentially leading to the exposure of sensitive information such as API keys and credentials stored in environment variables.

References

Affected packages

Git / github.com/gradio-app/gradio

Affected ranges

Type
GIT
Repo
https://github.com/gradio-app/gradio
Events

Affected versions

@gradio/audio@0.*
@gradio/audio@0.6.4
@gradio/button@0.*
@gradio/button@0.2.14
@gradio/chatbot@0.*
@gradio/chatbot@0.5.6
@gradio/client@0.*
@gradio/client@0.9.4
@gradio/code@0.*
@gradio/code@0.3.4
@gradio/dataframe@0.*
@gradio/dataframe@0.4.4
@gradio/dataset@0.*
@gradio/dataset@0.1.14
@gradio/file@0.*
@gradio/file@0.4.4
@gradio/gallery@0.*
@gradio/gallery@0.4.15
@gradio/image@0.*
@gradio/image@0.5.4
@gradio/imageeditor@0.*
@gradio/imageeditor@0.2.1
@gradio/model3d@0.*
@gradio/model3d@0.4.12
@gradio/upload@0.*
@gradio/upload@0.5.7
@gradio/uploadbutton@0.*
@gradio/uploadbutton@0.3.5
@gradio/video@0.*
@gradio/video@0.2.4
gradio@4.*
gradio@4.12.0
gradio_client@0.*
gradio_client@0.8.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-1561.json"