Home » Database

AVID-2026-R1449

Description

Jupyter Server Proxy’s Websocket Proxying does not require authentication (CVE-2024-28179)

Details

Jupyter Server Proxy allows users to run arbitrary external processes alongside their Jupyter notebook servers and provides authenticated web access. Prior to versions 3.2.3 and 4.1.1, Jupyter Server Proxy did not check user authentication appropriately when proxying websockets, allowing unauthenticated access to anyone who had network access to the Jupyter server endpoint. This vulnerability can allow unauthenticated remote access to any websocket endpoint set up to be accessible via Jupyter Server Proxy. In many cases, this leads to remote unauthenticated arbitrary code execution, due to how affected instances use websockets. The websocket endpoints exposed by jupyter_server itself is not affected. Projects that do not rely on websockets are also not affected. Versions 3.2.3 and 4.1.1 contain a fix for this issue.

Reason for inclusion in AVID: CVE-2024-28179 describes a vulnerability in jupyter-server-proxy where websocket proxying did not require authentication, enabling unauthenticated access and potential remote code execution. Jupyter Server Proxy is a software component commonly used in AI/ML notebook and deployment stacks (e.g., JupyterHub/JupyterLab setups) to facilitate web and websocket interactions. This directly impacts the software supply chain for general-purpose AI systems, as it concerns a dependency/framework used in building, deploying, and running AI workloads. It is a software vulnerability (RCE possibilities) and is supported by CVE details and fixes.

References

Affected or Relevant Artifacts

  • Developer: jupyterhub
  • Deployer: jupyterhub
  • Artifact Details:
TypeName
Systemjupyter-server-proxy

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Base Score9.1
Base Severity🔴 Critical
Attack VectorNETWORK
Attack Complexity🔴 High
Privileges RequiredNONE
User InteractionNONE
ScopeCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-306CWE-306: Missing Authentication for Critical Function

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2024-03-20
  • Version: 0.3.3
  • AVID Entry