CVE-2020-36191: Cross-Site Request Forgery in JupyterHub
4.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.32497%
CWE
Published
5/24/2022
Updated
9/24/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| jupyterhub | pip | < 1.2.0b1 | 1.2.0b1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from admin user management endpoints (/hub/api/user) not enforcing CSRF protection. In Tornado-based applications like JupyterHub, POST/DELETE handlers should call check_xsrf_cookie() or use @web.authenticated with xsrf protection. The GitHub issue (#3304) demonstrates these endpoints accept requests without _xsrf tokens, indicating missing CSRF checks in their handler methods. The UserAdminHandler's post() and delete() methods would be responsible for these actions, making them the likely vulnerable functions.