A timing attack vulnerability exists in the gradio-app/gradio repository, specifically within the login function in routes.py. The vulnerability arises from the use of a direct comparison operation (`app.auth[username] == password`) to validate user credentials, which can be exploited to guess passwords based on response times. Successful exploitation of this vulnerability could allow an attacker to bypass authentication mechanisms and gain unauthorized access.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: @huntr_ai
Published: 2024-03-29T04:35:12.067Z
Updated: 2024-08-01T18:48:21.924Z
Reserved: 2024-02-21T21:57:22.217Z
Link: CVE-2024-1729
Vulnrichment
Updated: 2024-08-01T18:48:21.924Z
NVD
Status : Awaiting Analysis
Published: 2024-03-29T05:15:45.477
Modified: 2024-11-21T08:51:10.860
Link: CVE-2024-1729
Redhat
No data.