DirectorySecurity Advisories
Sign In
Security Advisories

CGA-xp75-qhcg-gpq4

Published

Last updated

https://images.chainguard.dev/security/CGA-xp75-qhcg-gpq4
Package

kubeflow-pipelines-visualization-server

Latest Update
Fixed
Fixed Version

2.4.0-r0

Aliases
  • CVE-2022-29241
  • GHSA-q874-g24w-4q9g

Severity

7.1

High

CVSS V3

Summary

Jupyter server Token bruteforcing

Description

Affects: Notebook and Lab between 6.4.0?(potentially earlier) and 6.4.11 (currently latest). Jupyter Server <=1.16.0. If I am correct about the responsible code it will affect Jupyter-Server 1.17.0 and 2.0.0a0 as well. Description: If notebook server is started with a value of root_dir that contains the starting user's home directory, then the underlying REST API can be used to leak the access token assigned at start time by guessing/brute forcing the PID of the jupyter server. While this requires an authenticated user session, this url can be used from an xss payload (as in CVE-2021-32798) or from a hooked or otherwise compromised browser to leak this access token to a malicious third party. This token can be used along with the REST API to interact with Jupyter services/notebooks such as modifying or overwriting critical files, such as .bashrc or .ssh/authorized_keys, allowing a malicious user to read potentially sensitive data and possibly gain control of the impacted system.

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images