Description
A timing attack vulnerability exists in the gradio-app/gradio repository, specifically within the login function in routes.py. The vulnerability arises from the use of a direct comparison operation (`app.auth[username] == password`) to validate user credentials, which can be exploited to guess passwords based on response times. Successful exploitation of this vulnerability could allow an attacker to bypass authentication mechanisms and gain unauthorized access.
References (2)
Core 2
Core References
Exploit, Third Party Advisory
https://huntr.com/bounties/f6a10a8d-f538-4cb7-9bb2-85d9f5708124
Scores
CVSS v3
5.9
EPSS
0.0008
EPSS Percentile
23.7%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-367
Status
published
Products (2)
gradio_project/gradio
4.18.0 - 4.19.2
pypi/gradio
0 - 4.19.2PyPI
Published
Mar 29, 2024
Tracked Since
Feb 18, 2026