CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
26.1%
streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the url
variable on line 63 of pages/9_?_Vector_Data_Visualization.py
takes user input, which is later passed to the gpd.read_file
method. gpd.read_file
method creates a request to arbitrary destinations, leading to blind server-side request forgery. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue.
Vendor | Product | Version | CPE |
---|---|---|---|
opengeos | streamlit-geospatial | * | cpe:2.3:a:opengeos:streamlit-geospatial:*:*:*:*:*:*:*:* |
[
{
"vendor": "opengeos",
"product": "streamlit-geospatial",
"versions": [
{
"version": "< c4f81d9616d40c60584e36abb15300853a66e489",
"status": "affected"
}
]
}
]
github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/9_%F0%9F%94%B2_Vector_Data_Visualization.py#L63
github.com/opengeos/streamlit-geospatial/blob/4b89495f3bdd481998aadf1fc74b10de0f71c237/pages/9_%F0%9F%94%B2_Vector_Data_Visualization.py#L87
github.com/opengeos/streamlit-geospatial/commit/c4f81d9616d40c60584e36abb15300853a66e489
securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/