cve/2023/CVE-2023-25823.md

18 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-25823](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25823)
![](https://img.shields.io/static/v1?label=Product&message=gradio&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%203.13.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-798%3A%20Use%20of%20Hard-coded%20Credentials&color=brighgreen)
### Description
Gradio is an open-source Python library to build machine learning and data science demos and web applications. Versions prior to 3.13.1 contain Use of Hard-coded Credentials. When using Gradio's share links (i.e. creating a Gradio app and then setting `share=True`), a private SSH key is sent to any user that connects to the Gradio machine, which means that a user could access other users' shared Gradio demos. From there, other exploits are possible depending on the level of access/exposure the Gradio app provides. This issue is patched in version 3.13.1, however, users are recommended to update to 3.19.1 or later where the FRP solution has been properly tested.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/DummyOrganisationTest/test_dependabot2