Lucene search

K
cveGitHub_MCVE-2024-41118
HistoryJul 26, 2024 - 9:15 p.m.

CVE-2024-41118

2024-07-2621:15:13
CWE-918
GitHub_M
web.nvd.nist.gov
30
cve-2024-41118
streamlit-geospatial
ssrf
multipage app
geospatial applications
user input
get_layers function
web map service

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0.001

Percentile

27.7%

streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the url variable on line 47 of pages/7_?_Web_Map_Service.py takes user input, which is passed to get_layers function, in which url is used with get_wms_layer method. get_wms_layer method creates a request to arbitrary destinations, leading to blind server-side request forgery. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue.

Affected configurations

Nvd
Vulnrichment
Node
opengeosstreamlit-geospatialRange<2024-07-19
VendorProductVersionCPE
opengeosstreamlit-geospatial*cpe:2.3:a:opengeos:streamlit-geospatial:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "opengeos",
    "product": "streamlit-geospatial",
    "versions": [
      {
        "version": "< c4f81d9616d40c60584e36abb15300853a66e489",
        "status": "affected"
      }
    ]
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0.001

Percentile

27.7%

Related for CVE-2024-41118