
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-47168 affects Gradio, an open-source Python package designed for quick prototyping. The vulnerability was discovered and disclosed on October 10, 2024, impacting versions prior to 4.44. The issue involves data exposure through the enable_monitoring flag not properly disabling monitoring functionality when set to False (GitHub Advisory, NVD).
The vulnerability stems from a security flaw where the enable_monitoring flag fails to properly disable monitoring functionality when set to False. Even with monitoring supposedly disabled, unauthorized users can still access the monitoring dashboard by directly requesting the /monitoring endpoint. The vulnerability has been assigned a CVSS v3.1 Base Score of 4.3 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N, indicating a network-accessible vulnerability with low attack complexity requiring low privileges (NVD).
The vulnerability exposes sensitive application analytics data in environments where monitoring is expected to be disabled. This particularly affects users who explicitly set enable_monitoring=False with the intention of preventing unauthorized access to monitoring data (GitHub Advisory).
Users are advised to upgrade to Gradio version 4.44 or later to address this vulnerability. There are no known workarounds for this issue other than upgrading to the patched version (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."