AVID-2026-R1518
Description
Streamlit Path Traversal Security Vulnerability on Windows (CVE-2024-42474)
Details
Streamlit is a data oriented application development framework for python. Snowflake Streamlit open source addressed a security vulnerability via the static file sharing feature. Users of hosted Streamlit app(s) on Windows were vulnerable to a path traversal vulnerability when the static file sharing feature is enabled. An attacker could utilize the vulnerability to leak the password hash of the Windows user running Streamlit. The vulnerability was patched on Jul 25, 2024, as part of Streamlit open source version 1.37.0. The vulnerability only affects Windows.
Reason for inclusion in AVID: The CVE concerns Streamlit, a Python framework widely used to build and deploy AI/ML apps, and the vulnerability affects a component used in AI pipelines ( Streamlit’s static file sharing) with potential exposure of sensitive data. It is a documented software vulnerability with patch information and references, impacting the deployment/serving stage of AI systems. This fits software supply-chain concerns around AI software stacks (dependencies, runtimes, and deployment tooling) rather than hardware/firmware alone. Sufficient evidence is provided in the report (CVE ID, description, affected scope, patch, references).
References
- NVD entry
- https://github.com/streamlit/streamlit/security/advisories/GHSA-rxff-vr5r-8cj5
- https://github.com/streamlit/streamlit/commit/3a639859cfdfba2187c81897d44a3e33825eb0a3
Affected or Relevant Artifacts
- Developer: streamlit
- Deployer: streamlit
- Artifact Details:
| Type | Name |
|---|---|
| System | streamlit |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.0 |
| Vector String | CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N |
| Base Score | 5.9 |
| Base Severity | 🟠 Medium |
| Attack Vector | NETWORK |
| Attack Complexity | 🔴 High |
| Privileges Required | 🟢 Low |
| User Interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality Impact | 🔴 High |
| Integrity Impact | 🟢 Low |
| Availability Impact | NONE |
CWE
| ID | Description |
|---|---|
| CWE-22 | CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2024-08-12
- Version: 0.3.3
- AVID Entry