ghsa-vrq4-9hc3-cgp7
Vulnerability from github
Published
2025-04-12 03:42
Modified
2025-04-15 12:49
Severity ?
VLAI Severity ?
Summary
TigerVNC accessible via the network and not just via a UNIX socket as intended
Details
Summary
jupyter-remote-desktop-proxy
was meant to rely on UNIX sockets readable only by the current user since version 3.0.0, but when used with TigerVNC, the VNC server started by jupyter-remote-desktop-proxy
were still accessible via the network.
This vulnerability does not affect users having TurboVNC as the vncserver
executable.
Credits
This vulnerability was identified by Arne Gottwald at University of Göttingen and analyzed, reported, and reviewed by @frejanordsiek.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "jupyter-remote-desktop-proxy" }, "ranges": [ { "events": [ { "introduced": "3.0.0" }, { "fixed": "3.0.1" } ], "type": "ECOSYSTEM" } ], "versions": [ "3.0.0" ] } ], "aliases": [ "CVE-2025-32428" ], "database_specific": { "cwe_ids": [ "CWE-668" ], "github_reviewed": true, "github_reviewed_at": "2025-04-12T03:42:31Z", "nvd_published_at": "2025-04-15T00:15:14Z", "severity": "CRITICAL" }, "details": "## Summary\n\n`jupyter-remote-desktop-proxy` was meant to rely on UNIX sockets readable only by the current user since version 3.0.0, but when used with TigerVNC, the VNC server started by `jupyter-remote-desktop-proxy` were still accessible via the network.\n\nThis vulnerability does not affect users having TurboVNC as the `vncserver` executable.\n\n## Credits\n\nThis vulnerability was identified by Arne Gottwald at University of G\u00f6ttingen and analyzed, reported, and reviewed by @frejanordsiek.", "id": "GHSA-vrq4-9hc3-cgp7", "modified": "2025-04-15T12:49:04Z", "published": "2025-04-12T03:42:31Z", "references": [ { "type": "WEB", "url": "https://github.com/jupyterhub/jupyter-remote-desktop-proxy/security/advisories/GHSA-vrq4-9hc3-cgp7" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32428" }, { "type": "WEB", "url": "https://github.com/jupyterhub/jupyter-remote-desktop-proxy/commit/7dd54c25a4253badd8ea68895437e5a66a59090d" }, { "type": "PACKAGE", "url": "https://github.com/jupyterhub/jupyter-remote-desktop-proxy" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", "type": "CVSS_V4" } ], "summary": "TigerVNC accessible via the network and not just via a UNIX socket as intended" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…