Описание
remote code execution via git repo provider
Impact
A remote code execution vulnerability has been identified in BinderHub, where providing BinderHub with maliciously crafted input could execute code in the BinderHub context, with the potential to egress credentials of the BinderHub deployment, including JupyterHub API tokens, kubernetes service accounts, and docker registry credentials. This may provide the ability to manipulate images and other user created pods in the deployment, with the potential to escalate to the host depending on the underlying kubernetes configuration.
Patches
Patch below, or on GitHub
Workarounds
Disable the git repo provider by specifying the BinderHub.repo_providers config, e.g.:
References
Credit: Jose Carlos Luna Duran (CERN) and Riccardo Castellotti (CERN).
For more information
If you have any questions or comments about this advisory:
- Email us at security@ipython.org
Ссылки
- https://github.com/jupyterhub/binderhub/security/advisories/GHSA-9jjr-qqfp-ppwx
- https://nvd.nist.gov/vuln/detail/CVE-2021-39159
- https://github.com/jupyterhub/binderhub/commit/195caac172690456dcdc8cc7a6ca50e05abf8182
- https://github.com/jupyterhub/binderhub/commit/195caac172690456dcdc8cc7a6ca50e05abf8182.patch
- https://github.com/pypa/advisory-database/tree/main/vulns/binderhub/PYSEC-2021-371.yaml
Пакеты
binderhub
< 0.2.0
0.2.0
EPSS
9.4 Critical
CVSS4
9.6 Critical
CVSS3
CVE ID
Дефекты
Связанные уязвимости
BinderHub is a kubernetes-based cloud service that allows users to share reproducible interactive computing environments from code repositories. In affected versions a remote code execution vulnerability has been identified in BinderHub, where providing BinderHub with maliciously crafted input could execute code in the BinderHub context, with the potential to egress credentials of the BinderHub deployment, including JupyterHub API tokens, kubernetes service accounts, and docker registry credentials. This may provide the ability to manipulate images and other user created pods in the deployment, with the potential to escalate to the host depending on the underlying kubernetes configuration. Users are advised to update to version 0.2.0-n653. If users are unable to update they may disable the git repo provider by specifying the `BinderHub.repo_providers` as a workaround.
Уязвимость программного проекта для упаковки и совместного использования интерактивных воспроизводимых сред BinderHub, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код
EPSS
9.4 Critical
CVSS4
9.6 Critical
CVSS3