Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. streamlit
  4. ›
  5. GMS-2024-20

GMS-2024-20: Minor fix to previous patch for CVE-2022-35918

January 12, 2024

Impact

The initial vulnerability identified in Streamlit apps using custom components, allowing for directory traversal attacks, was addressed in version 1.11.1. However, a minor issue persisted, which could still potentially expose certain files on the server file-system under specific conditions.

Patches

We released an update in version 1.30.0 to further tighten security measures. Users are strongly advised to update to version 1.30.0 immediately for optimal security.

Workarounds

No additional workarounds are necessary once the update to version 1.30.0 is applied.

For more information

If you have any questions or comments about this advisory:

  • Email us at security@streamlit.io

References

  • github.com/advisories/GHSA-8qw9-gf7w-42x5
  • github.com/streamlit/streamlit/commit/bd0a8996c4c7ec55b9c6557e7b168b0c13a25b90
  • github.com/streamlit/streamlit/security/advisories/GHSA-8qw9-gf7w-42x5

Code Behaviors & Features

Detect and mitigate GMS-2024-20 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.63.0 before 1.30.0

Fixed versions

  • 1.30.0

Solution

Upgrade to version 1.30.0 or above.

Source file

pypi/streamlit/GMS-2024-20.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:41 +0000.