Safety vulnerability ID: 71660
The information on this page was manually curated by our Cybersecurity Intelligence Team.
An SSRF vulnerability exists in the gradio-app/gradio due to insufficient validation of user-supplied URLs in the `/proxy` route. Attackers can exploit this vulnerability by manipulating the `self.replica_urls` set through the `X-Direct-Url` header in requests to the `/` and `/config` routes, allowing the addition of arbitrary URLs for proxying. This flaw enables unauthorized proxying of requests and potential access to internal endpoints within the Hugging Face space. The issue arises from the application's inadequate checking of safe URLs in the `build_proxy_request` function.
Latest version: 5.9.1
Python library for easily interacting with trained machine learning models
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application