{"id":"CVE-2024-1729","details":"A timing attack vulnerability exists in the gradio-app/gradio repository, specifically within the login function in routes.py. The vulnerability arises from the use of a direct comparison operation (`app.auth[username] == password`) to validate user credentials, which can be exploited to guess passwords based on response times. Successful exploitation of this vulnerability could allow an attacker to bypass authentication mechanisms and gain unauthorized access.","aliases":["GHSA-hmx6-r76c-85g9"],"modified":"2026-03-14T12:25:22.348568Z","published":"2024-03-29T05:15:45.477Z","references":[{"type":"FIX","url":"https://github.com/gradio-app/gradio/commit/e329f1fd38935213fe0e73962e8cbd5d3af6e87b"},{"type":"EVIDENCE","url":"https://huntr.com/bounties/f6a10a8d-f538-4cb7-9bb2-85d9f5708124"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gradio-app/gradio","events":[{"introduced":"bb4126cc243bb3d198b16b85bef867ede830ecaf"},{"fixed":"bacbc70fa1936a5ca2bfd85ab493a4912004b10e"},{"fixed":"e329f1fd38935213fe0e73962e8cbd5d3af6e87b"}],"database_specific":{"versions":[{"introduced":"4.18.0"},{"fixed":"4.19.2"}]}}],"versions":["@gradio/accordion@0.3.1","@gradio/accordion@0.3.2","@gradio/accordion@0.3.3","@gradio/annotatedimage@0.5.0","@gradio/annotatedimage@0.5.1","@gradio/annotatedimage@0.5.2","@gradio/app@1.24.0","@gradio/app@1.25.0","@gradio/app@1.25.1","@gradio/atoms@0.5.2","@gradio/atoms@0.5.3","@gradio/audio@0.9.0","@gradio/audio@0.9.1","@gradio/audio@0.9.2","@gradio/box@0.1.10","@gradio/box@0.1.9","@gradio/button@0.2.20","@gradio/button@0.2.21","@gradio/button@0.2.22","@gradio/chatbot@0.7.0","@gradio/chatbot@0.7.1","@gradio/chatbot@0.7.2","@gradio/checkbox@0.2.10","@gradio/checkbox@0.2.9","@gradio/checkboxgroup@0.4.3","@gradio/checkboxgroup@0.4.4","@gradio/client@0.12.0","@gradio/client@0.12.1","@gradio/code@0.5.0","@gradio/code@0.5.1","@gradio/code@0.5.2","@gradio/colorpicker@0.2.10","@gradio/colorpicker@0.2.9","@gradio/dataframe@0.6.1","@gradio/dataframe@0.6.2","@gradio/dataframe@0.6.3","@gradio/dataset@0.1.20","@gradio/dataset@0.1.21","@gradio/dataset@0.1.22","@gradio/dropdown@0.6.0","@gradio/dropdown@0.6.1","@gradio/fallback@0.2.10","@gradio/fallback@0.2.9","@gradio/file@0.5.0","@gradio/file@0.5.1","@gradio/file@0.5.2","@gradio/fileexplorer@0.3.20","@gradio/fileexplorer@0.3.21","@gradio/fileexplorer@0.3.22","@gradio/form@0.1.10","@gradio/form@0.1.9","@gradio/gallery@0.7.0","@gradio/gallery@0.7.1","@gradio/gallery@0.7.2","@gradio/highlightedtext@0.4.10","@gradio/highlightedtext@0.4.9","@gradio/html@0.1.10","@gradio/html@0.1.9","@gradio/icons@0.3.3","@gradio/image@0.9.0","@gradio/image@0.9.1","@gradio/image@0.9.2","@gradio/imageeditor@0.4.0","@gradio/imageeditor@0.4.1","@gradio/imageeditor@0.4.2","@gradio/json@0.1.10","@gradio/json@0.1.9","@gradio/label@0.2.10","@gradio/label@0.2.9","@gradio/markdown@0.6.3","@gradio/markdown@0.6.4","@gradio/model3d@0.7.0","@gradio/model3d@0.8.0","@gradio/model3d@0.8.1","@gradio/number@0.3.10","@gradio/number@0.3.9","@gradio/paramviewer@0.4.2","@gradio/paramviewer@0.4.3","@gradio/plot@0.3.1","@gradio/plot@0.3.2","@gradio/radio@0.4.3","@gradio/radio@0.4.4","@gradio/simpledropdown@0.1.10","@gradio/simpledropdown@0.1.9","@gradio/simpleimage@0.3.0","@gradio/simpleimage@0.3.1","@gradio/simpleimage@0.3.2","@gradio/simpletextbox@0.1.10","@gradio/simpletextbox@0.1.9","@gradio/slider@0.2.10","@gradio/slider@0.2.9","@gradio/statustracker@0.4.6","@gradio/statustracker@0.4.7","@gradio/tabitem@0.2.3","@gradio/tabs@0.2.3","@gradio/textbox@0.4.10","@gradio/textbox@0.4.11","@gradio/tootils@0.2.0","@gradio/tootils@0.2.1","@gradio/tootils@0.2.2","@gradio/upload@0.7.2","@gradio/upload@0.7.3","@gradio/upload@0.7.4","@gradio/uploadbutton@0.4.5","@gradio/uploadbutton@0.4.6","@gradio/uploadbutton@0.4.7","@gradio/utils@0.3.0","@gradio/video@0.6.0","@gradio/video@0.6.1","@gradio/video@0.6.2","gradio@4.18.0","gradio@4.19.0","gradio@4.19.1","gradio_client@0.10.0","gradio_test@0.3.6","gradio_test@0.3.7","website@0.23.1","website@0.23.2","website@0.23.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-1729.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}