Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. gradio
  4. ›
  5. GHSA-3x9g-xfj5-fq84

GHSA-3x9g-xfj5-fq84: Duplicate Advisory: Cross-Site Request Forgery in Gradio

March 21, 2024 (updated May 21, 2024)

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-48cq-79qq-6f7x. this link is maintained to preserve external references.

Original Description

A Cross-Site Request Forgery gives attackers the ability to upload many large files to a victim, if they are running Gradio locally. To resolve this a PR tightening the CORS rules around Gradio applications has been submitted. In particular, it checks to see if the host header is localhost (or one of its aliases) and if so, it requires the origin header (if present) to be localhost (or one of its aliases) as well.

References

  • github.com/advisories/GHSA-3x9g-xfj5-fq84
  • github.com/gradio-app/gradio
  • github.com/gradio-app/gradio/commit/84802ee6a4806c25287344dce581f9548a99834a
  • github.com/gradio-app/gradio/pull/7503
  • huntr.com/bounties/a94d55fb-0770-4cbe-9b20-97a978a2ffff
  • nvd.nist.gov/vuln/detail/CVE-2024-1727

Code Behaviors & Features

Detect and mitigate GHSA-3x9g-xfj5-fq84 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.19.2

Fixed versions

  • 4.19.2

Solution

Upgrade to version 4.19.2 or above.

Impact 4.3 MEDIUM

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

Learn more about CVSS

Weakness

  • CWE-352: Cross-Site Request Forgery (CSRF)

Source file

pypi/gradio/GHSA-3x9g-xfj5-fq84.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:50 +0000.