A vulnerability in the dataframe component of gradio-app/gradio (version git 98cbcae) allows for a zip bomb attack. The component uses pd.read_csv to process input values, which can accept compressed files. An attacker can exploit this by uploading a maliciously crafted zip bomb, leading to a server crash and causing a denial of service.
References
| Link | Resource |
|---|---|
| https://huntr.com/bounties/7192bcbb-08a3-4d22-a321-9c6d19dbfc74 | Exploit Third Party Advisory |
| https://huntr.com/bounties/7192bcbb-08a3-4d22-a321-9c6d19dbfc74 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-03-20 10:15
Updated : 2025-10-07 20:58
NVD link : CVE-2024-10569
Mitre link : CVE-2024-10569
CVE.ORG link : CVE-2024-10569
JSON object : View
Products Affected
gradio_project
- gradio
CWE
CWE-475
Undefined Behavior for Input to API
