Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-41119
HistoryJul 26, 2024 - 8:54 p.m.

CVE-2024-41119 streamlit-geospatial remote code execution in pages/8_🏜️_Raster_Data_Visualization.py

2024-07-2620:54:49
CWE-20
GitHub_M
github.com
4
cve-2024-41119
streamlit-geospatial
remote code execution
geospatial applications
user input
eval function

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0.001

Percentile

26.1%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

total

streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the vis_params variable on line 80 in 8_🏜️_Raster_Data_Visualization.py takes user input, which is later used in the eval() function on line 86, leading to remote code execution. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:opengeos:streamlit-geospatial:*:*:*:*:*:*:*:*"
    ],
    "vendor": "opengeos",
    "product": "streamlit-geospatial",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "c4f81d9616d40c60584e36abb15300853a66e489",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0.001

Percentile

26.1%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-41119