Versio.io

CVE-2022-31027

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 09-06-2022 03:15
Last modified: - 16-06-2022 03:27
Total changes: - 3

Description

OAuthenticator is an OAuth token library for the JupyerHub login handler. CILogonOAuthenticator is provided by the OAuthenticator package, and lets users log in to a JupyterHub via CILogon. This is primarily used to restrict a JupyterHub only to users of a given institute. The allowed_idps configuration trait of CILogonOAuthenticator is documented to be a list of domains that indicate the institutions whose users are authorized to access this JupyterHub. This authorization is validated by ensuring that the *email* field provided to us by CILogon has a *domain* that matches one of the domains listed in `allowed_idps`.If `allowed_idps` contains `berkeley.edu`, you might expect only users with valid current credentials provided by University of California, Berkeley to be able to access the JupyterHub. However, CILogonOAuthenticator does *not* verify which provider is used by the user to login, only the email address provided. So a user can login with a GitHub account that has email set to `<something>@berkeley.edu`, and that will be treated exactly the same as someone logging in using the UC Berkeley official Identity Provider. The patch fixing this issue makes a *breaking change* in how `allowed_idps` is interpreted. It's no longer a list of domains, but configuration representing the `EntityID` of the IdPs that are allowed, picked from the [list maintained by CILogon](https://cilogon.org/idplist/). Users are advised to upgrade.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Low
Attack complexity
Network
Attack vector
None
Availability
High
Confidentiality
None
Integrity
Low
Privileges required
Unchanged
Scope
None
User interaction
6.5
Base score
2.8
3.6
Exploitability score
Impact score
 

Verification logic

OR
vendor=jupyter AND product=oauthenticator AND version=0.1.0
vendor=jupyter AND product=oauthenticator AND version=0.10.0
vendor=jupyter AND product=oauthenticator AND version=0.11.0
vendor=jupyter AND product=oauthenticator AND version=0.12.0
vendor=jupyter AND product=oauthenticator AND version=0.12.1
vendor=jupyter AND product=oauthenticator AND version=0.12.2
vendor=jupyter AND product=oauthenticator AND version=0.12.3
vendor=jupyter AND product=oauthenticator AND version=0.2.0
vendor=jupyter AND product=oauthenticator AND version=0.3.0
vendor=jupyter AND product=oauthenticator AND version=0.4.0
vendor=jupyter AND product=oauthenticator AND version=0.4.1
vendor=jupyter AND product=oauthenticator AND version=0.5.0
vendor=jupyter AND product=oauthenticator AND version=0.5.1
vendor=jupyter AND product=oauthenticator AND version=0.6.0
vendor=jupyter AND product=oauthenticator AND version=0.6.1
vendor=jupyter AND product=oauthenticator AND version=0.6.2
vendor=jupyter AND product=oauthenticator AND version=0.7.0
vendor=jupyter AND product=oauthenticator AND version=0.7.1
vendor=jupyter AND product=oauthenticator AND version=0.7.2
vendor=jupyter AND product=oauthenticator AND version=0.7.3
vendor=jupyter AND product=oauthenticator AND version=0.8.0
vendor=jupyter AND product=oauthenticator AND version=0.8.1
vendor=jupyter AND product=oauthenticator AND version=0.8.2
vendor=jupyter AND product=oauthenticator AND version=0.9.0
 

Reference

 


Keywords

NVD

 

CVE-2022-31027

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.