{ "schema_version": "1.4.0", "id": "GHSA-3x9g-xfj5-fq84", "modified": "2024-05-21T14:43:32Z", "published": "2024-03-21T21:31:15Z", "withdrawn": "2024-05-21T14:43:32Z", "aliases": [], "summary": "Duplicate Advisory: Cross-Site Request Forgery in Gradio", "details": "## Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-48cq-79qq-6f7x. this link is maintained to preserve external references.\n\n## Original Description\nA Cross-Site Request Forgery gives attackers the ability to upload many large files to a victim, if they are running Gradio locally. To resolve this a PR tightening the CORS rules around Gradio applications has been submitted. In particular, it checks to see if the host header is localhost (or one of its aliases) and if so, it requires the origin header (if present) to be localhost (or one of its aliases) as well.\n\n", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "affected": [ { "package": { "ecosystem": "PyPI", "name": "gradio" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "4.19.2" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1727" }, { "type": "WEB", "url": "https://github.com/gradio-app/gradio/pull/7503" }, { "type": "WEB", "url": "https://github.com/gradio-app/gradio/commit/84802ee6a4806c25287344dce581f9548a99834a" }, { "type": "PACKAGE", "url": "https://github.com/gradio-app/gradio" }, { "type": "WEB", "url": "https://huntr.com/bounties/a94d55fb-0770-4cbe-9b20-97a978a2ffff" } ], "database_specific": { "cwe_ids": [ "CWE-352" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2024-03-22T13:12:16Z", "nvd_published_at": "2024-03-21T20:15:07Z" } }