Home » Database

AVID-2026-R1512

Description

Remote code execution in streamlit geospatial in pages/1_📷_Timelapse.py MODIS Ocean Color SMI option palette (CVE-2024-41115)

Details

streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the palette variable on line 488 in pages/1_📷_Timelapse.py takes user input, which is later used in the eval() function on line 493, leading to remote code execution. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue.

Reason for inclusion in AVID: CVE-2024-41115 describes a remote code execution vulnerability in streamlit-geospatial caused by unsafe eval of user input, which is a software supply-chain issue in a component commonly used to build/deploy AI apps/pipelines. This affects software used to run general-purpose AI systems (e.g., dashboards/apps built with Streamlit), is an RCE vulnerability, and the report provides explicit evidence and a fix commit. Therefore it should be kept for AVID curation.

References

Affected or Relevant Artifacts

  • Developer: opengeos
  • Deployer: opengeos
  • Artifact Details:
TypeName
Systemstreamlit-geospatial

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score9.8
Base Severity🔴 Critical
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-20CWE-20: Improper Input Validation

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-07-26
  • Version: 0.3.3
  • AVID Entry