CVE-2024-35178: Jupyter server on Windows discloses Windows user password hash
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.42067%
CWE
Published
6/6/2024
Updated
1/21/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| jupyter_server | pip | <= 2.14.0 | 2.14.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper path handling in Jupyter Server's filefind utility. The key evidence is:
- The patch explicitly modifies filefind to reject absolute paths and add path containment checks
- The commit message references GHSA-hrw6-wg82-cm62 and mentions preventing access to absolute paths
- The CVE description specifically implicates Windows UNC path handling leading to NTLM hash leakage
- The removed expand_path function contained Windows-specific UNC path handling logic that could enable SMB authentication triggers
- The test cases added in the patch verify rejection of absolute paths and path traversal attempts