CVE-2024-41113: streamlit-geospatial: RCE via eval() in Timelapse page
CRITICAL PoC AVAILABLE CISA: ATTENDCritical unauthenticated RCE in streamlit-geospatial — any public deployment is fully compromised with a single HTTP request crafted in seconds. Patch immediately to commit c4f81d96 or disable the Timelapse page and restrict network access. Organizations using this for Earth Engine workflows risk full server takeover including cloud credential exfiltration.
Risk Assessment
Severity ceiling: CVSS 9.8, no authentication, no user interaction, network-exploitable with low complexity. The eval() pattern on user-controlled vis_params input is a textbook code injection — no AI/ML knowledge required to exploit, any script-kiddie with Shodan access can own this. Streamlit apps are routinely deployed for internal data science collaboration or exposed publicly for research, dramatically widening the attack surface. Not in KEV yet, but expect active exploitation given the GitHub Security Lab advisory and trivial exploit path.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| streamlit-geospatial | pip | — | No patch |
Do you use streamlit-geospatial? You're affected.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Update immediately to commit c4f81d9616d40c60584e36abb15300853a66e489 or disable the Timelapse page.
-
If patching is delayed, apply network ACLs to restrict access to trusted IPs only — do not leave publicly exposed.
-
Audit all other pages in the app for similar eval() or exec() patterns on user input.
-
Rotate any API keys accessible from the server (GEE tokens, cloud credentials, service accounts).
-
Review server logs for anomalous vis_params values indicating prior exploitation attempts.
-
Implement a WAF rule blocking Python built-in patterns (__import__, exec, subprocess) in input parameters as a compensating control.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-41113?
Critical unauthenticated RCE in streamlit-geospatial — any public deployment is fully compromised with a single HTTP request crafted in seconds. Patch immediately to commit c4f81d96 or disable the Timelapse page and restrict network access. Organizations using this for Earth Engine workflows risk full server takeover including cloud credential exfiltration.
Is CVE-2024-41113 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-41113, increasing the risk of exploitation.
How to fix CVE-2024-41113?
1. Update immediately to commit c4f81d9616d40c60584e36abb15300853a66e489 or disable the Timelapse page. 2. If patching is delayed, apply network ACLs to restrict access to trusted IPs only — do not leave publicly exposed. 3. Audit all other pages in the app for similar eval() or exec() patterns on user input. 4. Rotate any API keys accessible from the server (GEE tokens, cloud credentials, service accounts). 5. Review server logs for anomalous vis_params values indicating prior exploitation attempts. 6. Implement a WAF rule blocking Python built-in patterns (__import__, exec, subprocess) in input parameters as a compensating control.
What systems are affected by CVE-2024-41113?
This vulnerability affects the following AI/ML architecture patterns: geospatial AI/ML deployments, Streamlit-based ML web interfaces, data science web applications, academic and research ML environments, Earth Engine integration pipelines.
What is the CVSS score for CVE-2024-41113?
CVE-2024-41113 has a CVSS v3.1 base score of 9.8 (CRITICAL). The EPSS exploitation probability is 1.56%.
Technical Details
NVD Description
streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the `vis_params` variable on line 383 or line 390 in `pages/1_📷_Timelapse.py` takes user input, which is later used in the `eval()` function on line 395, leading to remote code execution. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue.
Exploitation Scenario
Adversary discovers a publicly exposed streamlit-geospatial instance via Shodan search for 'streamlit port:8501' or Google dork. They craft an HTTP POST to the Timelapse page setting vis_params to a Python expression such as __import__('subprocess').check_output(['env']) to enumerate environment variables. Within seconds they recover Google Earth Engine tokens, cloud IAM credentials, and database connection strings. They then establish a reverse shell via __import__('socket') for persistent C2 access, pivot to cloud storage to exfiltrate training datasets and model weights, and potentially move laterally into the broader cloud environment. The entire kill chain requires zero ML expertise.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References
- github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py Product
- github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py Product
- github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py Product
- github.com/opengeos/streamlit-geospatial/commit/c4f81d9616d40c60584e36abb15300853a66e489 Patch
- securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/ Exploit 3rd Party
- github.com/fkie-cad/nvd-json-data-feeds Exploit
Timeline
Related Vulnerabilities
CVE-2024-41116 9.8 streamlit-geospatial: RCE via eval() injection
Same package: streamlit CVE-2024-41114 9.8 streamlit-geospatial: RCE via eval() on palette input
Same package: streamlit CVE-2024-41115 9.8 streamlit-geospatial: eval() injection enables RCE
Same package: streamlit CVE-2024-41112 9.8 streamlit-geospatial: RCE via eval() on palette input
Same package: streamlit CVE-2024-41117 9.8 streamlit-geospatial: eval() injection allows RCE
Same package: streamlit
AI Threat Alert