CVE-2024-1183

An SSRF (Server-Side Request Forgery) vulnerability exists in the gradio-app/gradio repository, allowing attackers to scan and identify open ports within an internal network. By manipulating the 'file' parameter in a GET request, an attacker can discern the status of internal ports based on the presence of a 'Location' header or a 'File not allowed' error in the response.
Configurations

No configuration.

History

21 Nov 2024, 08:49

Type Values Removed Values Added
References () https://github.com/gradio-app/gradio/commit/2ad3d9e7ec6c8eeea59774265b44f11df7394bb4 - () https://github.com/gradio-app/gradio/commit/2ad3d9e7ec6c8eeea59774265b44f11df7394bb4 -
References () https://huntr.com/bounties/103434f9-87d2-42ea-9907-194a3c25007c - () https://huntr.com/bounties/103434f9-87d2-42ea-9907-194a3c25007c -

16 Apr 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-16 00:15

Updated : 2024-11-21 08:49


NVD link : CVE-2024-1183

Mitre link : CVE-2024-1183

CVE.ORG link : CVE-2024-1183


JSON object : View

Products Affected

No product.

CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')