Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-41942


JupyterHub is software that allows one to create a multi-user server for Jupyter notebooks. Prior to versions 4.1.6 and 5.1.0, if a user is granted the `admin:users` scope, they may escalate their own privileges by making themselves a full admin user. The impact is relatively small in that `admin:users` is already an extremely privileged scope only granted to trusted users. In effect, `admin:users` is equivalent to `admin=True`, which is not intended. Note that the change here only prevents escalation to the built-in JupyterHub admin role that has unrestricted permissions. It does not prevent users with e.g. `groups` permissions from granting themselves or other users permissions via group membership, which is intentional. Versions 4.1.6 and 5.1.0 fix this issue.


Published

2024-08-08T15:15:17.527

Last Modified

2024-08-12T15:53:27.457

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 7.2 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-274
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application jupyter jupyterhub < 4.1.6 Yes
Application jupyter jupyterhub 5.0.0 Yes
Application jupyter jupyterhub 5.0.0 Yes
Application jupyter jupyterhub 5.0.0 Yes

References