diff options
author | AUTOMATIC <16777216c@gmail.com> | 2022-11-04 07:07:29 +0000 |
---|---|---|
committer | AUTOMATIC <16777216c@gmail.com> | 2022-11-04 07:07:29 +0000 |
commit | 5f0117154382eb0e2547c72630256681673e353b (patch) | |
tree | 0779403a529613676d75bce60b44180564ac5fa6 /webui.py | |
parent | f2b69709eaff88fc3a2bd49585556ec0883bf5ea (diff) | |
download | stable-diffusion-webui-gfx803-5f0117154382eb0e2547c72630256681673e353b.tar.gz stable-diffusion-webui-gfx803-5f0117154382eb0e2547c72630256681673e353b.tar.bz2 stable-diffusion-webui-gfx803-5f0117154382eb0e2547c72630256681673e353b.zip |
shut down gradio's "everything allowed" CORS policy; I checked the main functionality to work with this, but if this breaks some exotic workflow, I'm sorry.
Diffstat (limited to 'webui.py')
-rw-r--r-- | webui.py | 6 |
1 files changed, 6 insertions, 0 deletions
@@ -141,6 +141,12 @@ def webui(): # after initial launch, disable --autolaunch for subsequent restarts
cmd_opts.autolaunch = False
+ # gradio uses a very open CORS policy via app.user_middleware, which makes it possible for
+ # an attacker to trick the user into opening a malicious HTML page, which makes a request to the
+ # running web ui and do whatever the attcker wants, including installing an extension and
+ # runnnig its code. We disable this here. Suggested by RyotaK.
+ app.user_middleware = [x for x in app.user_middleware if x.cls.__name__ != 'CORSMiddleware']
+
app.add_middleware(GZipMiddleware, minimum_size=1000)
if launch_api:
|