Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-28233
HistoryMar 27, 2024 - 6:16 p.m.

CVE-2024-28233 XSS in JupyterHub via Self-XSS leveraged by Cookie Tossing

2024-03-2718:16:24
CWE-352
CWE-565
CWE-79
GitHub_M
www.cve.org
jupyterhub
xss
self-xss
cookie tossing
user-controlled applications
vulnerability

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

7.8 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

JupyterHub is an open source multi-user server for Jupyter notebooks. By tricking a user into visiting a malicious subdomain, the attacker can achieve an XSS directly affecting the former’s session. More precisely, in the context of JupyterHub, this XSS could achieve full access to JupyterHub API and user’s single-user server. The affected configurations are single-origin JupyterHub deployments and JupyterHub deployments with user-controlled applications running on subdomains or peer subdomains of either the Hub or a single-user server. This vulnerability is fixed in 4.1.0.

CNA Affected

[
  {
    "vendor": "jupyterhub",
    "product": "jupyterhub",
    "versions": [
      {
        "version": "< 4.1.0",
        "status": "affected"
      }
    ]
  }
]

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

7.8 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%