POC详情: bfe988dc39f1fe7caf6e0174ff97d3463195815b

来源
关联漏洞
标题: Gradio 安全漏洞 (CVE-2024-1561)
描述:Gradio是一个开源 Python 库,是通过友好的 Web 界面演示机器学习模型的方法。 Gradio 存在安全漏洞,该漏洞源于端点不正确地允许调用类上的任何方法,允许未经授权的本地文件读取访问,可能导致敏感信息泄露。
描述
Poc for CVE-2024-1561 affecting Gradio 4.12.0
介绍
# CVE-2024-1561 PoC Script

This is a Proof of Concept (PoC) script for CVE-2024-1561.  

Check the full writeup for the CVE here: https://huntr.com/bounties/4acf584e-2fe8-490e-878d-2d9bf2698338

Affected Version: Gradio 4.12.0

This was fixed in this PR (https://github.com/gradio-app/gradio/pull/6884) and was released in version 4.13.0.

## Usage

1. Clone the repository and Navigate to the directory:

    ```bash
    git clone https://github.com/DiabloHTB/CVE-2024-1561
    cd CVE-2024-1561
    ```

2. Run the script with the following command:

    ```bash
    chmod +x CVE-2024-1561
    ./CVE-2024-1561 -u <URL> -f <FILE>
    ```

    Replace `<URL>` with the target URL and `<FILE>` with the file to be processed.

    Example:

    ```bash
    ./CVE-2024-1561 -u http://127.0.0.1:7860 -f /etc/passwd
    ```


## Options

- `-u, --url`: Specify the URL of the target.
- `-f, --file`: Specify the file.
- `-h, --help`: Help.

## Requirements

- Bash
- curl
- jq (for JSON parsing)

## Disclaimer

This script is a Proof of Concept (PoC) and should be used for educational and testing purposes only. Use it responsibly and at your own risk.


文件快照

[4.0K] /data/pocs/bfe988dc39f1fe7caf6e0174ff97d3463195815b ├── [2.1K] CVE-2024-1561 └── [1.1K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。