
Cloud Vulnerability DB
A community-led vulnerabilities database
BinderHub, a kubernetes-based cloud service, was found to contain a critical remote code execution vulnerability (CVE-2021-39159) discovered in August 2021. The vulnerability affected versions prior to 0.2.0-n653, where maliciously crafted input could execute code in the BinderHub context. This security flaw was identified by Jose Carlos Luna Duran and Riccardo Castellotti from CERN (GitHub Advisory).
The vulnerability stemmed from improper handling of git-ls-remote commands in the GitRepoProvider class. The issue allowed command injection through malicious input, as the code did not properly separate git-ls-remote options from positional arguments. The vulnerability was classified as CWE-94 (Improper Control of Generation of Code) and received a Critical severity rating (GitHub Advisory).
The vulnerability could allow attackers to execute arbitrary code in the BinderHub context, potentially exposing sensitive credentials including JupyterHub API tokens, kubernetes service accounts, and docker registry credentials. This access could enable manipulation of images and user-created pods in the deployment, with possible escalation to host access depending on the kubernetes configuration (GitHub Advisory).
The issue was patched in version 0.2.0-n653 by explicitly separating git-ls-remote options from positional arguments using the '--' delimiter. As a workaround, users could disable the git repo provider by specifying the BinderHub.repo_providers configuration to exclude the vulnerable GitRepoProvider (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."