8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
6.3 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
9.0%
JupyterHub is an open source multi-user server for Jupyter notebooks. By
tricking a user into visiting a malicious subdomain, the attacker can
achieve an XSS directly affecting the former’s session. More precisely, in
the context of JupyterHub, this XSS could achieve full access to JupyterHub
API and user’s single-user server. The affected configurations are
single-origin JupyterHub deployments and JupyterHub deployments with
user-controlled applications running on subdomains or peer subdomains of
either the Hub or a single-user server. This vulnerability is fixed in
4.1.0.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 22.04 | noarch | jupyterhub | < any | UNKNOWN |
ubuntu | 23.10 | noarch | jupyterhub | < any | UNKNOWN |
ubuntu | 24.04 | noarch | jupyterhub | < any | UNKNOWN |
github.com/jupyterhub/jupyterhub/commit/e2798a088f5ad45340fe79cdf1386198e664f77f
github.com/jupyterhub/jupyterhub/security/advisories/GHSA-7r3h-4ph8-w38g
launchpad.net/bugs/cve/CVE-2024-28233
nvd.nist.gov/vuln/detail/CVE-2024-28233
security-tracker.debian.org/tracker/CVE-2024-28233
www.cve.org/CVERecord?id=CVE-2024-28233
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
6.3 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
9.0%