CVE-2021-39159: remote code execution via git repo provider
(updated )
A remote code execution vulnerability has been identified in BinderHub, where providing BinderHub with maliciously crafted input could execute code in the BinderHub context, with the potential to egress credentials of the BinderHub deployment, including JupyterHub API tokens, kubernetes service accounts, and docker registry credentials. This may provide the ability to manipulate images and other user created pods in the deployment, with the potential to escalate to the host depending on the underlying kubernetes configuration.
References
- github.com/advisories/GHSA-9jjr-qqfp-ppwx
- github.com/jupyterhub/binderhub
- github.com/jupyterhub/binderhub/commit/195caac172690456dcdc8cc7a6ca50e05abf8182
- github.com/jupyterhub/binderhub/commit/195caac172690456dcdc8cc7a6ca50e05abf8182.patch
- github.com/jupyterhub/binderhub/security/advisories/GHSA-9jjr-qqfp-ppwx
- github.com/pypa/advisory-database/tree/main/vulns/binderhub/PYSEC-2021-371.yaml
- nvd.nist.gov/vuln/detail/CVE-2021-39159
Detect and mitigate CVE-2021-39159 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →