CVE-2024-1183

An SSRF (Server-Side Request Forgery) vulnerability exists in the gradio-app/gradio repository, allowing attackers to scan and identify open ports within an internal network. By manipulating the 'file' parameter in a GET request, an attacker can discern the status of internal ports based on the presence of a 'Location' header or a 'File not allowed' error in the response.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*

History

29 Jul 2025, 19:03

Type Values Removed Values Added
References () https://github.com/gradio-app/gradio/commit/2ad3d9e7ec6c8eeea59774265b44f11df7394bb4 - () https://github.com/gradio-app/gradio/commit/2ad3d9e7ec6c8eeea59774265b44f11df7394bb4 - Patch
References () https://huntr.com/bounties/103434f9-87d2-42ea-9907-194a3c25007c - () https://huntr.com/bounties/103434f9-87d2-42ea-9907-194a3c25007c - Exploit, Third Party Advisory
First Time Gradio Project
Gradio Project gradio
CPE cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*

Information

Published : 2024-04-16 00:15

Updated : 2025-07-29 19:03


NVD link : CVE-2024-1183

Mitre link : CVE-2024-1183

CVE.ORG link : CVE-2024-1183


JSON object : View

Products Affected

gradio_project

  • gradio
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')