Vulnerability Description
A vulnerability in the dataframe component of gradio-app/gradio (version git 98cbcae) allows for a zip bomb attack. The component uses pd.read_csv to process input values, which can accept compressed files. An attacker can exploit this by uploading a maliciously crafted zip bomb, leading to a server crash and causing a denial of service.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gradio Project | Gradio | 2024-09-18 |
Related Weaknesses (CWE)
References
- https://huntr.com/bounties/7192bcbb-08a3-4d22-a321-9c6d19dbfc74ExploitThird Party Advisory
- https://huntr.com/bounties/7192bcbb-08a3-4d22-a321-9c6d19dbfc74ExploitThird Party Advisory
FAQ
What is CVE-2024-10569?
CVE-2024-10569 is a vulnerability with a CVSS score of 7.5 (HIGH). A vulnerability in the dataframe component of gradio-app/gradio (version git 98cbcae) allows for a zip bomb attack. The component uses pd.read_csv to process input values, which can accept compressed ...
How severe is CVE-2024-10569?
CVE-2024-10569 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-10569?
Check the references section above for vendor advisories and patch information. Affected products include: Gradio Project Gradio.