CVE-2023-51449

Gradio is an open-source Python package that allows you to quickly build a demo or web application for your machine learning model, API, or any arbitary Python function. Versions of `gradio` prior to 4.11.0 contained a vulnerability in the `/file` route which made them susceptible to file traversal attacks in which an attacker could access arbitrary files on a machine running a Gradio app with a public URL (e.g. if the demo was created with `share=True`, or on Hugging Face Spaces) if they knew the path of files to look for. This issue has been patched in version 4.11.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*

History

No history.

Information

Published : 2023-12-22 21:15

Updated : 2024-01-09 20:18


NVD link : CVE-2023-51449

Mitre link : CVE-2023-51449

CVE.ORG link : CVE-2023-51449


JSON object : View

Products Affected

gradio_project

  • gradio
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')