CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2024-10624: Regular Expression Denial of Service (ReDoS) in gradio-app/gradio

7.5 CVSS

Description

A Regular Expression Denial of Service (ReDoS) vulnerability exists in the gradio-app/gradio repository, affecting the gr.Datetime component. The affected version is git commit 98cbcae. The vulnerability arises from the use of a regular expression `^(?:\s*now\s*(?:-\s*(\d+)\s*([dmhs]))?)?\s*$` to process user input. In Python's default regex engine, this regular expression can take polynomial time to match certain crafted inputs. An attacker can exploit this by sending a crafted HTTP request, causing the gradio process to consume 100% CPU and potentially leading to a Denial of Service (DoS) condition on the server.

Classification

CVE ID: CVE-2024-10624

CVSS Base Severity: HIGH

CVSS Base Score: 7.5

CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem Types

CWE-400 Uncontrolled Resource Consumption

Affected Products

Vendor: gradio-app

Product: gradio-app/gradio

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.73% (probability of being exploited)

EPSS Percentile: 71.31% (scored less or equal to compared to others)

EPSS Date: 2025-04-18 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2024-10624
https://huntr.com/bounties/e8d0b248-8feb-4c23-9ef9-be4d1e868374

Timeline