Platform
python
Component
gradio
Fixed in
5.0.1
5.0.0
CVE-2024-47167 describes a Server-Side Request Forgery (SSRF) vulnerability affecting Gradio versions up to 5.0.0b9. This flaw allows attackers to manipulate the /queue/join endpoint, forcing the Gradio server to make HTTP requests to attacker-controlled URLs. Successful exploitation could lead to unauthorized access to internal resources and potential data exfiltration.
The SSRF vulnerability in Gradio's /queue/join endpoint poses a significant risk. An attacker can leverage this to craft malicious HTTP requests that the Gradio server will execute on their behalf. This allows them to target internal services that are not directly accessible from the outside, potentially gaining access to sensitive data or performing actions as the Gradio server. The ability to upload content from these external URLs and store it locally further exacerbates the risk, as attackers could upload malicious files to the server. This is particularly concerning in environments where Gradio is used to expose machine learning models or other internal applications.
CVE-2024-47167 was publicly disclosed on 2024-10-10. No known public proof-of-concept exploits are currently available, but the SSRF nature of the vulnerability makes it likely that one will emerge. The vulnerability is not currently listed on CISA KEV. Given the ease of SSRF exploitation and the potential for internal network access, this vulnerability warrants prompt attention.
Exploit Status
EPSS
0.24% (47% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2024-47167 is to upgrade Gradio to version 5.0.0 or later, which contains the fix. If an immediate upgrade is not feasible, consider implementing temporary workarounds. Restrict network access to the Gradio server to only allow connections to trusted internal resources. Implement a Web Application Firewall (WAF) with rules to block suspicious outbound HTTP requests, particularly those targeting unusual ports or internal IP addresses. Carefully review and validate any user-provided URLs before they are used in HTTP requests. After upgrading, confirm the fix by attempting to trigger the /queue/join endpoint with a known malicious URL and verifying that the request is blocked.
Update the Gradio library to version 5.0 or higher. Alternatively, disable or restrict URL-based inputs in your Gradio application to trusted domains. Implement stricter URL validation and ensure that local or internal network addresses cannot be requested via the `/queue/join` endpoint.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2024-47167 is a Server-Side Request Forgery (SSRF) vulnerability in Gradio versions up to 5.0.0b9, allowing attackers to force the server to make HTTP requests to attacker-controlled URLs.
If you are using Gradio version 5.0.0b9 or earlier, you are potentially affected by this SSRF vulnerability. Assess your environment and upgrade as soon as possible.
Upgrade Gradio to version 5.0.0 or later to remediate the vulnerability. Implement temporary workarounds like WAF rules and network restrictions if immediate upgrade is not possible.
While no public exploits are currently known, the SSRF nature of the vulnerability suggests potential for exploitation. Monitor your systems and apply the fix promptly.
Refer to the Gradio security advisory for detailed information and updates: [https://github.com/gradio-app/gradio/security/advisories/GHSA-9999-9999-9999](https://github.com/gradio-app/gradio/security/advisories/GHSA-9999-9999-9999)
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your requirements.txt file and we'll tell you instantly if you're affected.