Vulnerability Details : CVE-2020-26261
jupyterhub-systemdspawner enables JupyterHub to spawn single-user notebook servers using systemd. In jupyterhub-systemdspawner before version 0.15 user API tokens issued to single-user servers are specified in the environment of systemd units. These tokens are incorrectly accessible to all users. In particular, the-littlest-jupyterhub is affected, which uses systemdspawner by default. This is patched in jupyterhub-systemdspawner v0.15
Products affected by CVE-2020-26261
- cpe:2.3:a:jupyterhub:systemdspawner:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-26261
0.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 34 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-26261
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.3
|
LOW | AV:L/AC:M/Au:N/C:P/I:P/A:N |
3.4
|
4.9
|
NIST | |
7.9
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N |
1.5
|
5.8
|
NIST | |
7.9
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N |
1.5
|
5.8
|
GitHub, Inc. |
CWE ids for CVE-2020-26261
-
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.Assigned by:
- nvd@nist.gov (Primary)
- security-advisories@github.com (Secondary)
References for CVE-2020-26261
-
https://github.com/jupyterhub/systemdspawner/security/advisories/GHSA-cg54-gpgr-4rm6
Third Party Advisory
-
https://github.com/jupyterhub/systemdspawner/commit/a4d08fd2ade1cfd0ef2c29dc221e649345f23580
Patch;Third Party Advisory
-
https://github.com/jupyterhub/systemdspawner/blob/master/CHANGELOG.md#v015
Release Notes;Third Party Advisory
-
https://pypi.org/project/jupyterhub-systemdspawner/
Product;Third Party Advisory
Jump to