Soumettre #580250: gradio <=5.29.1 Cross-Site Request Forgeryinformation

Titregradio <=5.29.1 Cross-Site Request Forgery
DescriptionGradio's CORS configuration is designed to protect internally deployed applications from attack vectors such as CSRF and data exfiltration attacks originating from external sources. However, the current implementation contains flaws that allow malicious actors to bypass the CORS origin validation, fixed at CVE-2024-47165. This vulnerability can be exploited to steal sensitive data from internally deployed Gradio applications, even when they are intended to be protected against such attacks.
La source⚠️ https://gist.github.com/superboy-zjc/aa3dfa161d7b19d8a53ab4605792f2fe
Utilisateur
 Gavin Zhong (UID 84092)
Soumission18/05/2025 17:59 (il y a 11 mois)
Modérer29/05/2025 10:07 (11 days later)
StatutAccepté
Entrée VulDB310491 [gradio-app gradio jusqu’à 5.29.1 CORS is_valid_origin localhost_aliases élévation de privilèges]
Points20

Want to know what is going to be exploited?

We predict KEV entries!