CVE-2024-41942: JupyterHub has a privilege escalation vulnerability with the `admin:users` scope
7.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.46315%
CWE
Published
8/8/2024
Updated
1/21/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| jupyterhub | pip | < 4.1.6 | 4.1.6 |
| jupyterhub | pip | >= 5.0.0, < 5.1.0 | 5.1.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing authorization checks in user management endpoints. The commit diff shows added admin checks in users.py's post() and patch() methods. These functions previously allowed users with admin:users scope to set admin=True without being admins themselves. The tests in test_api.py validate these scenarios but are not themselves vulnerable. The core issue was in the API handlers' failure to verify admin status before processing privilege changes.