Headline
CVE-2023-33979: 修复Gradio配置泄露的问题 · binary-husky/gpt_academic@1dcc287
gpt_academic provides a graphical interface for ChatGPT/GLM. A vulnerability was found in gpt_academic 3.37 and prior. This issue affects some unknown processing of the component Configuration File Handler. The manipulation of the argument file leads to information disclosure. Since no sensitive files are configured to be off-limits, sensitive information files in some working directories can be read through the /file
route, leading to sensitive information leakage. This affects users that uses file configurations via config.py
, config_private.py
, Dockerfile
. A patch is available at commit 1dcc2873d2168ad2d3d70afcb453ac1695fbdf02. As a workaround, one may use environment variables instead of config*.py
files to configure this project, or use docker-compose installation to configure this project.
Expand Up
@@ -197,7 +197,9 @@ def open():
threading.Thread(target=warm_up_modules, name="warm-up", daemon=True).start()
auto_opentab_delay()
demo.queue(concurrency_count=CONCURRENT_COUNT).launch(server_name="0.0.0.0", server_port=PORT, auth=AUTHENTICATION, favicon_path="docs/logo.png")
demo.queue(concurrency_count=CONCURRENT_COUNT).launch(
server_name="0.0.0.0", server_port=PORT, auth=AUTHENTICATION,
favicon_path="docs/logo.png", blocked_paths=[“config.py","config_private.py","docker-compose.yml","Dockerfile”])
# 如果需要在二级路径下运行
# CUSTOM_PATH, = get_conf(‘CUSTOM_PATH’)
Expand Down