Miggo Logo

CVE-2024-51751: Gradio vulnerable to arbitrary file read with File and UploadButton components

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.15431%
Published
11/6/2024
Updated
11/6/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
gradiopip>= 5.0.0, < 5.5.05.5.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two key issues: 1) client_utils.is_file_obj_with_meta's strict dependency on the 'meta' field allows bypassing path validation, and 2) the file processing functions (File/UploadButton._process_single_file) trust unvalidated paths. The processing_utils.async_move_files_to_cache function's reliance on the flawed is_file_obj_with_meta filter creates a chain of trust violation. These functions are explicitly mentioned in the vulnerability details as the execution path that enables arbitrary file read when the meta key is omitted.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry I* *il* or Uplo***utton *ompon*nts *r* us** *s * p*rt o* *r**io *ppli**tion to pr*vi*w *il* *ont*nt, *n *tt**k*r wit* ****ss to t** *ppli**tion mi**t **us* t**s* *ompon*nts to r*** *r*itr*ry *il*s *rom t** *ppli**tion s*rv*r. ### **t*ils

Reasoning

T** vuln*r**ility st*ms *rom two k*y issu*s: *) *li*nt_utils.is_*il*_o*j_wit*_m*t*'s stri*t **p*n**n*y on t** 'm*t*' *i*l* *llows *yp*ssin* p*t* v*li**tion, *n* *) t** *il* pro**ssin* *un*tions (*il*/Uplo***utton._pro**ss_sin*l*_*il*) trust unv*li**t