A timing attack vulnerability exists in the gradio-app/gradio repository, specifically within the login function in routes.py. The vulnerability arises from the use of a direct comparison operation (`app.auth[username] == password`) to validate user credentials, which can be exploited to guess passwords based on response times. Successful exploitation of this vulnerability could allow an attacker to bypass authentication mechanisms and gain unauthorized access.
References
Configurations
No configuration.
History
21 Nov 2024, 08:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/gradio-app/gradio/commit/e329f1fd38935213fe0e73962e8cbd5d3af6e87b - | |
References | () https://huntr.com/bounties/f6a10a8d-f538-4cb7-9bb2-85d9f5708124 - |
16 Apr 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) A timing attack vulnerability exists in the gradio-app/gradio repository, specifically within the login function in routes.py. The vulnerability arises from the use of a direct comparison operation (`app.auth[username] == password`) to validate user credentials, which can be exploited to guess passwords based on response times. Successful exploitation of this vulnerability could allow an attacker to bypass authentication mechanisms and gain unauthorized access. |
29 Mar 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-29 05:15
Updated : 2024-11-21 08:51
NVD link : CVE-2024-1729
Mitre link : CVE-2024-1729
CVE.ORG link : CVE-2024-1729
JSON object : View
Products Affected
No product.
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition