GHSA-vrq4-9hc3-cgp7

Suggest an improvement
Source
https://github.com/advisories/GHSA-vrq4-9hc3-cgp7
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-vrq4-9hc3-cgp7/GHSA-vrq4-9hc3-cgp7.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-vrq4-9hc3-cgp7
Aliases
Published
2025-04-12T03:42:31Z
Modified
2025-04-15T12:49:04Z
Severity
  • 9.0 (Critical) CVSS_V4 - CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H CVSS Calculator
Summary
TigerVNC accessible via the network and not just via a UNIX socket as intended
Details

Summary

jupyter-remote-desktop-proxy was meant to rely on UNIX sockets readable only by the current user since version 3.0.0, but when used with TigerVNC, the VNC server started by jupyter-remote-desktop-proxy were still accessible via the network.

This vulnerability does not affect users having TurboVNC as the vncserver executable.

Credits

This vulnerability was identified by Arne Gottwald at University of Göttingen and analyzed, reported, and reviewed by @frejanordsiek.

Database specific
{
    "nvd_published_at": "2025-04-15T00:15:14Z",
    "cwe_ids": [
        "CWE-668"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2025-04-12T03:42:31Z"
}
References

Affected packages

PyPI / jupyter-remote-desktop-proxy

Package

Name
jupyter-remote-desktop-proxy
View open source insights on deps.dev
Purl
pkg:pypi/jupyter-remote-desktop-proxy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.0.0
Fixed
3.0.1

Affected versions

3.*

3.0.0