Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. gradio
  4. ›
  5. CVE-2024-47167

CVE-2024-47167: Gradio vulnerable to SSRF in the path parameter of /queue/join

October 10, 2024 (updated January 21, 2025)

What kind of vulnerability is it? Who is impacted?

This vulnerability relates to Server-Side Request Forgery (SSRF) in the /queue/join endpoint. Gradio’s async_save_url_to_cache function allows attackers to force the Gradio server to send HTTP requests to user-controlled URLs. This could enable attackers to target internal servers or services within a local network and possibly exfiltrate data or cause unwanted internal requests. Additionally, the content from these URLs is stored locally, making it easier for attackers to upload potentially malicious files to the server. This impacts users deploying Gradio servers that use components like the Video component which involve URL fetching.

References

  • github.com/advisories/GHSA-576c-3j53-r9jj
  • github.com/gradio-app/gradio
  • github.com/gradio-app/gradio/security/advisories/GHSA-576c-3j53-r9jj
  • github.com/pypa/advisory-database/tree/main/vulns/gradio/PYSEC-2024-215.yaml
  • nvd.nist.gov/vuln/detail/CVE-2024-47167

Code Behaviors & Features

Detect and mitigate CVE-2024-47167 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 5.0.0

Fixed versions

  • 5.0.0

Solution

Upgrade to version 5.0.0 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-918: Server-Side Request Forgery (SSRF)

Source file

pypi/gradio/CVE-2024-47167.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:52 +0000.