2025-03-23 03:03:54 +00:00

64 lines
2.6 KiB
JSON

{
"id": "CVE-2024-12217",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-03-20T10:15:27.560",
"lastModified": "2025-03-20T16:15:13.620",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the gradio-app/gradio repository, version git 67e4044, allows for path traversal on Windows OS. The implementation of the blocked_path functionality, which is intended to disallow users from reading certain files, is flawed. Specifically, while the application correctly blocks access to paths like 'C:/tmp/secret.txt', it fails to block access when using NTFS Alternate Data Streams (ADS) syntax, such as 'C:/tmp/secret.txt::$DATA'. This flaw can lead to unauthorized reading of blocked file paths."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el repositorio gradio-app/gradio, versi\u00f3n git 67e4044, permite path traversal en el sistema operativo Windows. La implementaci\u00f3n de la funci\u00f3n \"blocked_path\", cuyo objetivo es impedir que los usuarios lean ciertos archivos, es defectuoso. En concreto, si bien la aplicaci\u00f3n bloquea correctamente el acceso a rutas como \"C:/tmp/secret.txt\", no lo bloquea al usar la sintaxis de flujos de datos alternativos (ADS) de NTFS, como \"C:/tmp/secret.txt::$DATA\". Este fallo puede provocar la lectura no autorizada de rutas de archivos bloqueadas."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://huntr.com/bounties/0439bf3d-cb38-43a5-8314-0fadf85cc5a0",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/0439bf3d-cb38-43a5-8314-0fadf85cc5a0",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}