Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 832052 - <dev-python/jupyter-server-proxy-3.2.1: lack of input validation can lead to SSRF (CVE-2022-21697)
Summary: <dev-python/jupyter-server-proxy-3.2.1: lack of input validation can lead to ...
Status: RESOLVED DUPLICATE of bug 832051
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2022-01-25 15:56 UTC by filip ambroz
Modified: 2022-01-25 16:21 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description filip ambroz 2022-01-25 15:56:03 UTC
Jupyter Server Proxy prior to 3.2.1 are vulnerable to Server-Side Request Forgery (SSRF). Any user deploying Jupyter Server or Notebook with jupyter-proxy-server extension enabled is affected. A lack of input validation allows authenticated clients to proxy requests to other hosts, bypassing the `allowed_hosts` check. Because authentication is required, which already grants permissions to make the same requests via kernel or terminal execution, this is considered low to moderate severity.

Patch:
https://github.com/jupyterhub/jupyter-server-proxy/compare/v3.2.0...v3.2.1.patch
https://github.com/jupyterhub/jupyter-server-proxy/commit/fd31930bacd12188c448c886e0783529436b99eb
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-01-25 16:03:05 UTC
Sorry filip! We filed these at about the same time

*** This bug has been marked as a duplicate of bug 832051 ***
Comment 2 filip ambroz 2022-01-25 16:21:32 UTC
(In reply to John Helmert III from comment #1)
> Sorry filip! We filed these at about the same time
> 
> *** This bug has been marked as a duplicate of bug 832051 ***

no problem ;)