CVE-2024-41942

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-41942
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-41942.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-41942
Aliases
Downstream
Related
Published
2024-08-08T14:36:44Z
Modified
2025-11-04T20:26:49.034835Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
JupyterHub has a privilege escalation vulnerability with the `admin:users` scope
Details

JupyterHub is software that allows one to create a multi-user server for Jupyter notebooks. Prior to versions 4.1.6 and 5.1.0, if a user is granted the admin:users scope, they may escalate their own privileges by making themselves a full admin user. The impact is relatively small in that admin:users is already an extremely privileged scope only granted to trusted users. In effect, admin:users is equivalent to admin=True, which is not intended. Note that the change here only prevents escalation to the built-in JupyterHub admin role that has unrestricted permissions. It does not prevent users with e.g. groups permissions from granting themselves or other users permissions via group membership, which is intentional. Versions 4.1.6 and 5.1.0 fix this issue.

Database specific
{
    "cwe_ids": [
        "CWE-274"
    ]
}
References

Affected packages

Git / github.com/jupyterhub/jupyterhub

Affected ranges

Type
GIT
Repo
https://github.com/jupyterhub/jupyterhub
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "4.1.6"
        }
    ]
}
Type
GIT
Repo
https://github.com/jupyterhub/jupyterhub
Events
Database specific
{
    "versions": [
        {
            "introduced": "5.0.0"
        },
        {
            "fixed": "5.1.0"
        }
    ]
}

Affected versions

0.*

0.1.0
0.2.0
0.3.0
0.4.0
0.4.1
0.5.0
0.6.0
0.6.1
0.7.0
0.7.1
0.7.2
0.8.0
0.8.0b1
0.8.0b2
0.8.0b3
0.8.0b4
0.8.0b5
0.8.0rc1
0.8.0rc2
0.8.1
0.9.0
0.9.0b1
0.9.0b2
0.9.0b3
0.9.0rc1
0.9.1
0.9.2

1.*

1.0.0
1.0.0b1
1.0.0b2
1.1.0
1.1.0b1
1.2.0
1.2.0b1
1.2.1
1.3.0
1.4.0

2.*

2.0.0
2.0.0b1
2.0.0b2
2.0.0b3
2.0.0rc1
2.0.0rc2
2.0.0rc3
2.0.0rc4
2.0.0rc5
2.0.1
2.0.2
2.1.0
2.1.1
2.2.0
2.2.1
2.2.2

3.*

3.0.0
3.0.0b1
3.1.0

4.*

4.0.0
4.0.0b1
4.0.0b2
4.0.1
4.0.2
4.1.0
4.1.1
4.1.2
4.1.3
4.1.4
4.1.5

5.*

5.0.0