CVE-2024-42474: Streamlit: path traversal leaks Windows NTLM hash
MEDIUM PoC AVAILABLEStreamlit deployments on Windows with static file sharing enabled expose the running user's NTLM password hash to any low-privileged attacker. That hash can be cracked offline or weaponized in pass-the-hash attacks for lateral movement. Patch to v1.37.0 immediately and audit whether static file sharing is active across your data science environment.
Risk Assessment
CVSS 6.5 understates enterprise risk. Streamlit is pervasive in data science teams on Windows workstations and servers, frequently running under domain accounts with elevated privileges for database or GPU access. An exposed NTLM hash enables offline brute-force or direct pass-the-hash attacks, potentially granting access to broader enterprise resources. Risk escalates significantly in domain-joined environments where a single compromised account can cascade. The low attack complexity and no user interaction requirement mean exploitation is straightforward once a vulnerable instance is identified.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| streamlit | pip | — | No patch |
Do you use streamlit? You're affected.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Patch: Upgrade Streamlit to v1.37.0 or later immediately—this is the only complete fix.
-
Disable: If patching is delayed, set enableStaticServing = false in .streamlit/config.toml or via environment variable STREAMLIT_SERVER_ENABLE_STATIC_SERVING=false.
-
Audit: Inventory all Streamlit deployments on Windows; grep config files and startup scripts for enableStaticServing.
-
Network controls: Block outbound SMB (TCP 445/139) from Streamlit hosts to prevent NTLM relay to attacker-controlled servers.
-
Monitor: Alert on path traversal patterns (../, ..\, URL-encoded variants) in static file request logs.
-
Rotate credentials: If exposure is suspected on any host, rotate credentials for accounts that ran Streamlit and check for lateral movement indicators.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-42474?
Streamlit deployments on Windows with static file sharing enabled expose the running user's NTLM password hash to any low-privileged attacker. That hash can be cracked offline or weaponized in pass-the-hash attacks for lateral movement. Patch to v1.37.0 immediately and audit whether static file sharing is active across your data science environment.
Is CVE-2024-42474 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-42474, increasing the risk of exploitation.
How to fix CVE-2024-42474?
1. Patch: Upgrade Streamlit to v1.37.0 or later immediately—this is the only complete fix. 2. Disable: If patching is delayed, set enableStaticServing = false in .streamlit/config.toml or via environment variable STREAMLIT_SERVER_ENABLE_STATIC_SERVING=false. 3. Audit: Inventory all Streamlit deployments on Windows; grep config files and startup scripts for enableStaticServing. 4. Network controls: Block outbound SMB (TCP 445/139) from Streamlit hosts to prevent NTLM relay to attacker-controlled servers. 5. Monitor: Alert on path traversal patterns (../, ..\, URL-encoded variants) in static file request logs. 6. Rotate credentials: If exposure is suspected on any host, rotate credentials for accounts that ran Streamlit and check for lateral movement indicators.
What systems are affected by CVE-2024-42474?
This vulnerability affects the following AI/ML architecture patterns: ML demo applications, model serving, data science internal tooling, ML prototyping environments.
What is the CVSS score for CVE-2024-42474?
CVE-2024-42474 has a CVSS v3.1 base score of 6.5 (MEDIUM). The EPSS exploitation probability is 1.65%.
Technical Details
NVD Description
Streamlit is a data oriented application development framework for python. Snowflake Streamlit open source addressed a security vulnerability via the static file sharing feature. Users of hosted Streamlit app(s) on Windows were vulnerable to a path traversal vulnerability when the static file sharing feature is enabled. An attacker could utilize the vulnerability to leak the password hash of the Windows user running Streamlit. The vulnerability was patched on Jul 25, 2024, as part of Streamlit open source version 1.37.0. The vulnerability only affects Windows.
Exploitation Scenario
An adversary with any authenticated access to a Streamlit app (legitimate user, insider, or anyone who can reach the endpoint) crafts a path traversal request targeting the static file serving endpoint. On Windows, this can reference a UNC path (e.g., \\attacker-controlled-server\share\file), forcing the Windows host to initiate NTLM authentication to the attacker's server. Using a tool like Responder, the attacker captures the NTLMv2 hash. They either crack it offline using a GPU cluster if the password is weak, or relay it directly in a pass-the-hash attack against other Windows systems in the environment. In an AI/ML context, the Streamlit host almost certainly has access to training data stores, model registries, MLflow tracking servers, or database credentials—making it an ideal lateral movement pivot into the broader AI infrastructure.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N References
- github.com/streamlit/streamlit/commit/3a639859cfdfba2187c81897d44a3e33825eb0a3 Patch
- github.com/streamlit/streamlit/security/advisories/GHSA-rxff-vr5r-8cj5 Vendor
- github.com/fkie-cad/nvd-json-data-feeds Exploit
- github.com/haiyen11231/automation-tool-for-patch-backporting Exploit
- github.com/nvn1729/advisories Exploit
Timeline
Related Vulnerabilities
CVE-2024-41115 9.8 streamlit-geospatial: eval() injection enables RCE
Same package: streamlit CVE-2024-41113 9.8 streamlit-geospatial: RCE via eval() in Timelapse page
Same package: streamlit CVE-2024-41114 9.8 streamlit-geospatial: RCE via eval() on palette input
Same package: streamlit CVE-2024-41112 9.8 streamlit-geospatial: RCE via eval() on palette input
Same package: streamlit CVE-2024-41116 9.8 streamlit-geospatial: RCE via eval() injection
Same package: streamlit
AI Threat Alert