Description

streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the `url` variable on line 63 of `pages/9_🔲_Vector_Data_Visualization.py` takes user input, which is later passed to the `gpd.read_file` method. `gpd.read_file` method creates a request to arbitrary destinations, leading to blind server-side request forgery. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue.

INFO

Published Date :

2024-07-26T20:57:31.466Z

Last Modified :

2024-08-02T04:46:51.580Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2024-41120 vulnerability.

Vendors Products
Opengeos
  • Streamlit-geospatial

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact