Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-41113
HistoryJul 26, 2024 - 8:05 p.m.

CVE-2024-41113 Remote code execution in streamlit geospatial in pages/1_📷_Timelapse.py Any Earth Engine ImageCollection option vis_params

2024-07-2620:05:58
CWE-20
GitHub_M
github.com
2
cve security fix streamlit multipage app geospatial applications remote code execution 2024-41113 streamlit-geospatial streamlit geospatial app commit.

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0.001

Percentile

26.1%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

total

streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the vis_params variable on line 383 or line 390 in pages/1_📷_Timelapse.py takes user input, which is later used in the eval() function on line 395, leading to remote code execution. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:opengeos:streamlit-geospatial:*:*:*:*:*:*:*:*"
    ],
    "vendor": "opengeos",
    "product": "streamlit-geospatial",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "c4f81d9616d40c60584e36abb15300853a66e489",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0.001

Percentile

26.1%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-41113