{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T07:33:47.315","vulnerabilities":[{"cve":{"id":"CVE-2024-12217","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:27.560","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the gradio-app/gradio repository, version git 67e4044, allows for path traversal on Windows OS. The implementation of the blocked_path functionality, which is intended to disallow users from reading certain files, is flawed. Specifically, while the application correctly blocks access to paths like 'C:/tmp/secret.txt', it fails to block access when using NTFS Alternate Data Streams (ADS) syntax, such as 'C:/tmp/secret.txt::$DATA'. This flaw can lead to unauthorized reading of blocked file paths."},{"lang":"es","value":"Una vulnerabilidad en el repositorio gradio-app/gradio, versión git 67e4044, permite path traversal en el sistema operativo Windows. La implementación de la función \"blocked_path\", cuyo objetivo es impedir que los usuarios lean ciertos archivos, es defectuoso. En concreto, si bien la aplicación bloquea correctamente el acceso a rutas como \"C:/tmp/secret.txt\", no lo bloquea al usar la sintaxis de flujos de datos alternativos (ADS) de NTFS, como \"C:/tmp/secret.txt::$DATA\". Este fallo puede provocar la lectura no autorizada de rutas de archivos bloqueadas."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"references":[{"url":"https://huntr.com/bounties/0439bf3d-cb38-43a5-8314-0fadf85cc5a0","source":"security@huntr.dev"},{"url":"https://huntr.com/bounties/0439bf3d-cb38-43a5-8314-0fadf85cc5a0","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}}]}