Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-41120
HistoryJul 26, 2024 - 8:57 p.m.

CVE-2024-41120 streamlit-geospatial blind SSRF in pages/9_🔲_Vector_Data_Visualization.py

2024-07-2620:57:31
CWE-20
GitHub_M
github.com
2
cve-2024-41120
streamlit-geospatial
ssrf
gpd.read_file
server-side request forgery

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7

Confidence

High

EPSS

0.001

Percentile

26.1%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

total

streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the url variable on line 63 of pages/9_🔲_Vector_Data_Visualization.py takes user input, which is later passed to the gpd.read_file method. gpd.read_file method creates a request to arbitrary destinations, leading to blind server-side request forgery. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:opengeos:streamlit-geospatial:*:*:*:*:*:*:*:*"
    ],
    "vendor": "opengeos",
    "product": "streamlit-geospatial",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "c4f81d9616d40c60584e36abb15300853a66e489",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7

Confidence

High

EPSS

0.001

Percentile

26.1%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-41120