Description
Gradio is an open-source Python package designed for quick prototyping. This vulnerability is related to **CORS origin validation**, where the Gradio server fails to validate the request origin when a cookie is present. This allows an attacker’s website to make unauthorized requests to a local Gradio server. Potentially, attackers can upload files, steal authentication tokens, and access user data if the victim visits a malicious website while logged into Gradio. This impacts users who have deployed Gradio locally and use basic authentication. Users are advised to upgrade to `gradio>4.44` to address this issue. As a workaround, users can manually enforce stricter CORS origin validation by modifying the `CustomCORSMiddleware` class in their local Gradio server code. Specifically, they can bypass the condition that skips CORS validation for requests containing cookies to prevent potential exploitation.
INFO
Published Date :
2024-10-10T21:53:51.940Z
Last Modified :
2024-10-11T15:24:05.733Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2024-47084 vulnerability.
| Vendors | Products |
|---|---|
| Gradio Project |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2024-47084.