A local file include could be remotely triggered in Gradio due to a vulnerable user-supplied JSON value in an API request.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://huntr.com/bounties/25e25501-5918-429c-8541-88832dfd3741 | third party advisory exploit |
https://github.com/gradio-app/gradio/commit/d76bcaaaf0734aaf49a680f94ea9d4d22a602e70 | patch |