Lucene search

K
cveGitHub_MCVE-2024-41120
HistoryJul 26, 2024 - 9:15 p.m.

CVE-2024-41120

2024-07-2621:15:14
CWE-918
CWE-20
GitHub_M
web.nvd.nist.gov
26
streamlit-geospatial
ssrf
vulnerability
fix
commit
c4f81d9616d40c60584e36abb15300853a66e489

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.001

Percentile

26.1%

streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the url variable on line 63 of pages/9_?_Vector_Data_Visualization.py takes user input, which is later passed to the gpd.read_file method. gpd.read_file method creates a request to arbitrary destinations, leading to blind server-side request forgery. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue.

Affected configurations

Nvd
Vulnrichment
Node
opengeosstreamlit-geospatialRange<2024-07-19
VendorProductVersionCPE
opengeosstreamlit-geospatial*cpe:2.3:a:opengeos:streamlit-geospatial:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "opengeos",
    "product": "streamlit-geospatial",
    "versions": [
      {
        "version": "< c4f81d9616d40c60584e36abb15300853a66e489",
        "status": "affected"
      }
    ]
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.001

Percentile

26.1%

Related for CVE-2024-41120