AVID-2026-R1449
Description
Jupyter Server Proxy’s Websocket Proxying does not require authentication (CVE-2024-28179)
Details
Jupyter Server Proxy allows users to run arbitrary external processes alongside their Jupyter notebook servers and provides authenticated web access. Prior to versions 3.2.3 and 4.1.1, Jupyter Server Proxy did not check user authentication appropriately when proxying websockets, allowing unauthenticated access to anyone who had network access to the Jupyter server endpoint. This vulnerability can allow unauthenticated remote access to any websocket endpoint set up to be accessible via Jupyter Server Proxy. In many cases, this leads to remote unauthenticated arbitrary code execution, due to how affected instances use websockets. The websocket endpoints exposed by jupyter_server itself is not affected. Projects that do not rely on websockets are also not affected. Versions 3.2.3 and 4.1.1 contain a fix for this issue.
Reason for inclusion in AVID: CVE-2024-28179 describes a vulnerability in jupyter-server-proxy where websocket proxying did not require authentication, enabling unauthenticated access and potential remote code execution. Jupyter Server Proxy is a software component commonly used in AI/ML notebook and deployment stacks (e.g., JupyterHub/JupyterLab setups) to facilitate web and websocket interactions. This directly impacts the software supply chain for general-purpose AI systems, as it concerns a dependency/framework used in building, deploying, and running AI workloads. It is a software vulnerability (RCE possibilities) and is supported by CVE details and fixes.
References
- NVD entry
- https://github.com/jupyterhub/jupyter-server-proxy/security/advisories/GHSA-w3vc-fx9p-wp4v
- https://github.com/jupyterhub/jupyter-server-proxy/commit/764e499f61a87641916a7a427d4c4b1ac3f321a9
- https://github.com/jupyterhub/jupyter-server-proxy/commit/bead903b7c0354b6efd8b4cde94b89afab653e03
- https://github.com/jupyterhub/jupyter-server-proxy/blob/9b624c4d9507176334b46a85d94a4aa3bcd29bed/jupyter_server_proxy/handlers.py#L433
Affected or Relevant Artifacts
- Developer: jupyterhub
- Deployer: jupyterhub
- Artifact Details:
| Type | Name |
|---|---|
| System | jupyter-server-proxy |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.1 |
| Vector String | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
| Base Score | 9.1 |
| Base Severity | 🔴 Critical |
| Attack Vector | NETWORK |
| Attack Complexity | 🔴 High |
| Privileges Required | NONE |
| User Interaction | NONE |
| Scope | CHANGED |
| Confidentiality Impact | 🔴 High |
| Integrity Impact | 🔴 High |
| Availability Impact | 🔴 High |
CWE
| ID | Description |
|---|---|
| CWE-306 | CWE-306: Missing Authentication for Critical Function |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2024-03-20
- Version: 0.3.3
- AVID Entry