Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v9g2-g7j4-4jxc

Опубликовано: 23 мая 2024
Источник: github
Github: Прошло ревью
CVSS3: 5.3

Описание

jupyter-scheduler's endpoint is missing authentication

Impact

jupyter_scheduler is missing an authentication check in Jupyter Server on an API endpoint (GET /scheduler/runtime_environments) which lists the names of the Conda environments on the server. In affected versions, jupyter_scheduler allows an unauthenticated user to obtain the list of Conda environment names on the server. This reveals any information that may be present in a Conda environment name.

This issue does not allow an unauthenticated third party to read, modify, or enter the Conda environments present on the server where jupyter_scheduler is running. This issue only reveals the list of Conda environment names.

Impacted versions: >=1.0.0,<=1.1.5 ; ==1.2.0 ; >=1.3.0,<=1.8.1 ; >=2.0.0,<=2.5.1

Patches

  • jupyter-scheduler==1.1.6
  • jupyter-scheduler==1.2.1
  • jupyter-scheduler==1.8.2
  • jupyter-scheduler==2.5.2

Workarounds

Server operators who are unable to upgrade can disable the jupyter-scheduler extension with:

jupyter server extension disable jupyter-scheduler

References

If you have any questions or comments about this advisory we ask that you contact AWS/Amazon Security via our vulnerability reporting page [1] or directly via email to aws-security@amazon.com. Please do not create a public GitHub issue.

[1] Vulnerability reporting page: https://aws.amazon.com/security/vulnerability-reporting

Пакеты

Наименование

jupyter-scheduler

pip
Затронутые версииВерсия исправления

>= 1.0.0, < 1.1.6

1.1.6

Наименование

jupyter-scheduler

pip
Затронутые версииВерсия исправления

= 1.2.0

1.2.1

Наименование

jupyter-scheduler

pip
Затронутые версииВерсия исправления

>= 1.3.0, < 1.8.2

1.8.2

Наименование

jupyter-scheduler

pip
Затронутые версииВерсия исправления

>= 2.0.0, < 2.5.2

2.5.2

EPSS

Процентиль: 34%
0.00137
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-200
CWE-287

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 1 года назад

Jupyter Scheduler is collection of extensions for programming jobs to run now or run on a schedule. The list of conda environments of `jupyter-scheduler` users maybe be exposed, potentially revealing information about projects that a specific user may be working on. This vulnerability has been patched in version(s) 1.1.6, 1.2.1, 1.8.2 and 2.5.2.

CVSS3: 5.3
nvd
больше 1 года назад

Jupyter Scheduler is collection of extensions for programming jobs to run now or run on a schedule. The list of conda environments of `jupyter-scheduler` users maybe be exposed, potentially revealing information about projects that a specific user may be working on. This vulnerability has been patched in version(s) 1.1.6, 1.2.1, 1.8.2 and 2.5.2.

EPSS

Процентиль: 34%
0.00137
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-200
CWE-287