CVE-2024-28188: jupyter-scheduler's endpoint is missing authentication
jupyter_scheduler
is missing an authentication check in Jupyter Server on an API endpoint (GET /scheduler/runtime_environments
) which lists the names of the Conda environments on the server. In affected versions, jupyter_scheduler
allows an unauthenticated user to obtain the list of Conda environment names on the server. This reveals any information that may be present in a Conda environment name.
This issue does not allow an unauthenticated third party to read, modify, or enter the Conda environments present on the server where jupyter_scheduler
is running. This issue only reveals the list of Conda environment names.
Impacted versions: >=1.0.0,<=1.1.5 ; ==1.2.0 ; >=1.3.0,<=1.8.1 ; >=2.0.0,<=2.5.1
References
- github.com/advisories/GHSA-v9g2-g7j4-4jxc
- github.com/jupyter-server/jupyter-scheduler
- github.com/jupyter-server/jupyter-scheduler/commit/06435a2277bb2b8f441ec9cedafa474572b92c5d
- github.com/jupyter-server/jupyter-scheduler/commit/a621b386397280cc8ee5a208dca4607cb71cdd65
- github.com/jupyter-server/jupyter-scheduler/commit/d428ac871909444e175ba421bf8ab4980d6ebf9f
- github.com/jupyter-server/jupyter-scheduler/commit/f4137a779fdf0cc4a9688a42dd8c6e7ade60f044
- github.com/jupyter-server/jupyter-scheduler/security/advisories/GHSA-v9g2-g7j4-4jxc
- github.com/jupyter-server/jupyter_server/pull/1392
- nvd.nist.gov/vuln/detail/CVE-2024-28188
Detect and mitigate CVE-2024-28188 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →