Home Β» Database

AVID-2026-R1513

Description

Remote code execution in streamlit geospatial in pages/10_🌍_Earth_Engine_Datasets.py (CVE-2024-41117)

Details

streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the vis_params variable on line 115 in pages/10_🌍_Earth_Engine_Datasets.py takes user input, which is later used in the eval() function on line 126, leading to remote code execution. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue.

Reason for inclusion in AVID: CVE-2024-41117 describes a remote code execution vulnerability in the streamlit-geospatial package caused by unsafe eval of user input. This is a software vulnerability in a component commonly used to build/deploy AI/ML apps and dashboards, i.e., part of the AI software supply chain. It affects software dependencies/ runtimes used in AI pipelines. The CVE entry provides evidence (commit fix, vulnerable code references, CVSS details). Therefore it should be kept for AVID curation.

References

Affected or Relevant Artifacts

  • Developer: opengeos
  • Deployer: opengeos
  • Artifact Details:
TypeName
Systemstreamlit-geospatial

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score9.8
Base SeverityπŸ”΄ Critical
Attack VectorNETWORK
Attack Complexity🟒 Low
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality ImpactπŸ”΄ High
Integrity ImpactπŸ”΄ High
Availability ImpactπŸ”΄ High

CWE

IDDescription
CWE-20CWE-20: Improper Input Validation

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-07-26
  • Version: 0.3.3
  • AVID Entry