
Cloud Vulnerability DB
A community-led vulnerabilities database
Gradio, an open-source Python package designed for quick prototyping, contains a timing attack vulnerability (CVE-2024-47869) in its analytics_dashboard function. The vulnerability was discovered and disclosed on October 10, 2024, affecting all versions prior to 4.44. The issue stems from non-constant-time comparison when comparing hashes (NVD, GitHub Advisory).
The vulnerability exists in the hash comparison mechanism of the analytics_dashboard function. The comparison is not performed in constant time, making it susceptible to timing attacks. An attacker can measure response times of different requests to infer the correct hash byte-by-byte. The vulnerability has been assigned a CVSS v3.1 base score of 3.7 (LOW) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N (NVD).
The successful exploitation of this vulnerability could lead to unauthorized access to the analytics dashboard. This is particularly concerning when an attacker can repeatedly query the system with different keys, potentially compromising the confidentiality of analytics data (GitHub Advisory).
The primary mitigation is to upgrade to Gradio version 4.44 or later. For users unable to upgrade immediately, two workarounds are available: 1) manually patch the analytics_dashboard to use a constant-time comparison function for comparing sensitive values, or 2) disable access to the analytics dashboard entirely (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."