提交 #580250: gradio <=5.29.1 Cross-Site Request Forgery信息

标题gradio <=5.29.1 Cross-Site Request Forgery
描述Gradio's CORS configuration is designed to protect internally deployed applications from attack vectors such as CSRF and data exfiltration attacks originating from external sources. However, the current implementation contains flaws that allow malicious actors to bypass the CORS origin validation, fixed at CVE-2024-47165. This vulnerability can be exploited to steal sensitive data from internally deployed Gradio applications, even when they are intended to be protected against such attacks.
来源⚠️ https://gist.github.com/superboy-zjc/aa3dfa161d7b19d8a53ab4605792f2fe
用户
 Gavin Zhong (UID 84092)
提交2025-05-18 17時59分 (11 月前)
管理2025-05-29 10時07分 (11 days later)
状态已接受
VulDB条目310491 [gradio-app gradio 直到 5.29.1 CORS is_valid_origin localhost_aliases 权限提升]
积分20

Want to know what is going to be exploited?

We predict KEV entries!