// For flags

CVE-2024-28233

XSS in JupyterHub via Self-XSS leveraged by Cookie Tossing

Severity Score

8.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

JupyterHub is an open source multi-user server for Jupyter notebooks. By tricking a user into visiting a malicious subdomain, the attacker can achieve an XSS directly affecting the former's session. More precisely, in the context of JupyterHub, this XSS could achieve full access to JupyterHub API and user's single-user server. The affected configurations are single-origin JupyterHub deployments and JupyterHub deployments with user-controlled applications running on subdomains or peer subdomains of either the Hub or a single-user server. This vulnerability is fixed in 4.1.0.

JupyterHub es un servidor multiusuario de código abierto para portátiles Jupyter. Al engañar a un usuario para que visite un subdominio malicioso, el atacante puede lograr un XSS que afecte directamente a la sesión del primero. Más precisamente, en el contexto de JupyterHub, este XSS podría lograr acceso completo a la API de JupyterHub y al servidor de usuario único del usuario. Las configuraciones afectadas son implementaciones de JupyterHub de origen único e implementaciones de JupyterHub con aplicaciones controladas por el usuario que se ejecutan en subdominios o subdominios pares del concentrador o de un servidor de usuario único. Esta vulnerabilidad se solucionó en 4.1.0.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-03-07 CVE Reserved
  • 2024-03-27 CVE Published
  • 2024-03-28 EPSS Updated
  • 2024-08-15 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • CWE-352: Cross-Site Request Forgery (CSRF)
  • CWE-565: Reliance on Cookies without Validation and Integrity Checking
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Jupyterhub
Search vendor "Jupyterhub"
Jupyterhub
Search vendor "Jupyterhub" for product "Jupyterhub"
< 4.1.0
Search vendor "Jupyterhub" for product "Jupyterhub" and version " < 4.1.0"
en
Affected