Lucene search

K
cve[email protected]CVE-2023-48311
HistoryDec 08, 2023 - 8:15 p.m.

CVE-2023-48311

2023-12-0820:15:07
CWE-20
web.nvd.nist.gov
16
cve-2023-48311
dockerspawner
jupyterhub
docker containers
security
vulnerability
upgrade
nvd

8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

4.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.0%

dockerspawner is a tool to spawn JupyterHub single user servers in Docker containers. Users of JupyterHub deployments running DockerSpawner starting with 0.11.0 without specifying DockerSpawner.allowed_images configuration allow users to launch any pullable docker image, instead of restricting to only the single configured image, as intended. This issue has been addressed in commit 3ba4b665b which has been included in dockerspawner release version 13. Users are advised to upgrade. Users unable to upgrade should explicitly set DockerSpawner.allowed_images to a non-empty list containing only the default image will result in the intended default behavior.

Affected configurations

Vulners
NVD
Node
jupyterhubkubespawnerRange0.11.013.0
VendorProductVersionCPE
jupyterhubkubespawner*cpe:2.3:a:jupyterhub:kubespawner:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "jupyterhub",
    "product": "dockerspawner",
    "versions": [
      {
        "version": ">= 0.11.0, < 13.0",
        "status": "affected"
      }
    ]
  }
]

8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

4.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.0%

Related for CVE-2023-48311