mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
18 lines
1.1 KiB
Markdown
18 lines
1.1 KiB
Markdown
### [CVE-2024-41120](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41120)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
streamlit-geospatial is a streamlit multipage app for geospatial applications. Prior to commit c4f81d9616d40c60584e36abb15300853a66e489, the `url` variable on line 63 of `pages/9_🔲_Vector_Data_Visualization.py` takes user input, which is later passed to the `gpd.read_file` method. `gpd.read_file` method creates a request to arbitrary destinations, leading to blind server-side request forgery. Commit c4f81d9616d40c60584e36abb15300853a66e489 fixes this issue.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://securitylab.github.com/advisories/GHSL-2024-100_GHSL-2024-108_streamlit-geospatial/
|
|
|
|
#### Github
|
|
No PoCs found on GitHub currently.
|
|
|