CVE-2024-41113: streamlit-geospatial: RCE via eval() in Timelapse page

CRITICAL PoC AVAILABLE CISA: ATTEND
Published July 26, 2024
CISO Take

Critical unauthenticated RCE in streamlit-geospatial — any public deployment is fully compromised with a single HTTP request crafted in seconds. Patch immediately to commit c4f81d96 or disable the Timelapse page and restrict network access. Organizations using this for Earth Engine workflows risk full server takeover including cloud credential exfiltration.

Risk Assessment

Severity ceiling: CVSS 9.8, no authentication, no user interaction, network-exploitable with low complexity. The eval() pattern on user-controlled vis_params input is a textbook code injection — no AI/ML knowledge required to exploit, any script-kiddie with Shodan access can own this. Streamlit apps are routinely deployed for internal data science collaboration or exposed publicly for research, dramatically widening the attack surface. Not in KEV yet, but expect active exploitation given the GitHub Security Lab advisory and trivial exploit path.

Affected Systems

Package Ecosystem Vulnerable Range Patched
streamlit-geospatial pip No patch
44.4K OpenSSF 7.2 2.8K dependents Pushed 7d ago 8% patched ~0d to patch Full package profile →

Do you use streamlit-geospatial? You're affected.

Severity & Risk

CVSS 3.1
9.8 / 10
EPSS
1.6%
chance of exploitation in 30 days
Higher than 82% of all CVEs
Exploitation Status
Exploit Available
Exploitation: MEDIUM
Sophistication
Trivial
Exploitation Confidence
medium
CISA SSVC: Public PoC
Public PoC indexed (trickest/cve)
Composite signal derived from CISA KEV, CISA SSVC, EPSS, trickest/cve, and Nuclei templates.

Attack Surface

AV AC PR UI S C I A
AV Network
AC Low
PR None
UI None
S Unchanged
C High
I High
A High

Recommended Action

6 steps
  1. Update immediately to commit c4f81d9616d40c60584e36abb15300853a66e489 or disable the Timelapse page.

  2. If patching is delayed, apply network ACLs to restrict access to trusted IPs only — do not leave publicly exposed.

  3. Audit all other pages in the app for similar eval() or exec() patterns on user input.

  4. Rotate any API keys accessible from the server (GEE tokens, cloud credentials, service accounts).

  5. Review server logs for anomalous vis_params values indicating prior exploitation attempts.

  6. Implement a WAF rule blocking Python built-in patterns (__import__, exec, subprocess) in input parameters as a compensating control.

CISA SSVC Assessment

Decision Attend
Exploitation poc
Automatable Yes
Technical Impact total

Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Article 15 - Accuracy, Robustness and Cybersecurity
ISO 42001
A.6.2.6 - AI system security measures
NIST AI RMF
MANAGE 2.4 - Risks and residual risks are treated and managed
OWASP LLM Top 10
LLM05:2025 - Improper Output Handling

Frequently Asked Questions

What is CVE-2024-41113?

Critical unauthenticated RCE in streamlit-geospatial — any public deployment is fully compromised with a single HTTP request crafted in seconds. Patch immediately to commit c4f81d96 or disable the Timelapse page and restrict network access. Organizations using this for Earth Engine workflows risk full server takeover including cloud credential exfiltration.

Is CVE-2024-41113 actively exploited?

Proof-of-concept exploit code is publicly available for CVE-2024-41113, increasing the risk of exploitation.

How to fix CVE-2024-41113?

1. Update immediately to commit c4f81d9616d40c60584e36abb15300853a66e489 or disable the Timelapse page. 2. If patching is delayed, apply network ACLs to restrict access to trusted IPs only — do not leave publicly exposed. 3. Audit all other pages in the app for similar eval() or exec() patterns on user input. 4. Rotate any API keys accessible from the server (GEE tokens, cloud credentials, service accounts). 5. Review server logs for anomalous vis_params values indicating prior exploitation attempts. 6. Implement a WAF rule blocking Python built-in patterns (__import__, exec, subprocess) in input parameters as a compensating control.

What systems are affected by CVE-2024-41113?

This vulnerability affects the following AI/ML architecture patterns: geospatial AI/ML deployments, Streamlit-based ML web interfaces, data science web applications, academic and research ML environments, Earth Engine integration pipelines.

What is the CVSS score for CVE-2024-41113?

CVE-2024-41113 has a CVSS v3.1 base score of 9.8 (CRITICAL). The EPSS exploitation probability is 1.56%.

Technical Details

NVD Description

streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the `vis_params` variable on line 383 or line 390 in `pages/1_📷_Timelapse.py` takes user input, which is later used in the `eval()` function on line 395, leading to remote code execution. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue.

Exploitation Scenario

Adversary discovers a publicly exposed streamlit-geospatial instance via Shodan search for 'streamlit port:8501' or Google dork. They craft an HTTP POST to the Timelapse page setting vis_params to a Python expression such as __import__('subprocess').check_output(['env']) to enumerate environment variables. Within seconds they recover Google Earth Engine tokens, cloud IAM credentials, and database connection strings. They then establish a reverse shell via __import__('socket') for persistent C2 access, pivot to cloud storage to exfiltrate training datasets and model weights, and potentially move laterally into the broader cloud environment. The entire kill chain requires zero ML expertise.

Weaknesses (CWE)

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Timeline

Published
July 26, 2024
Last Modified
November 21, 2024
First Seen
July 26, 2024

Related Vulnerabilities