Vulnerability Description
A Cross-Site Request Forgery (CSRF) vulnerability in gradio-app/gradio allows attackers to upload multiple large files to a victim's system if they are running Gradio locally. By crafting a malicious HTML page that triggers an unauthorized file upload to the victim's server, an attacker can deplete the system's disk space, potentially leading to a denial of service. This issue affects the file upload functionality as implemented in gradio/routes.py.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gradio Project | Gradio | >= 4.16.0, < 4.19.2 |
Related Weaknesses (CWE)
References
- https://github.com/gradio-app/gradio/commit/84802ee6a4806c25287344dce581f9548a99Patch
- https://huntr.com/bounties/a94d55fb-0770-4cbe-9b20-97a978a2ffffExploitThird Party Advisory
- https://github.com/gradio-app/gradio/commit/84802ee6a4806c25287344dce581f9548a99Patch
- https://huntr.com/bounties/a94d55fb-0770-4cbe-9b20-97a978a2ffffExploitThird Party Advisory
FAQ
What is CVE-2024-1727?
CVE-2024-1727 is a vulnerability with a CVSS score of 4.3 (MEDIUM). A Cross-Site Request Forgery (CSRF) vulnerability in gradio-app/gradio allows attackers to upload multiple large files to a victim's system if they are running Gradio locally. By crafting a malicious ...
How severe is CVE-2024-1727?
CVE-2024-1727 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-1727?
Check the references section above for vendor advisories and patch information. Affected products include: Gradio Project Gradio.