CVE-2024-28233
Python vulnerability analysis and mitigation

Overview

JupyterHub, an open source multi-user server for Jupyter notebooks, was found to contain a cross-site scripting (XSS) vulnerability identified as CVE-2024-28233. The vulnerability affects JupyterHub versions prior to 4.1.0 and was disclosed on March 27, 2024. The vulnerability impacts single-origin JupyterHub deployments and JupyterHub deployments with user-controlled applications running on subdomains or peer subdomains of either the Hub or a single-user server (GitHub Advisory).

Technical details

The vulnerability involves a combination of self-XSS leveraged by cookie tossing techniques. By tricking a user into visiting a malicious subdomain, an attacker can achieve cross-site scripting that directly affects the victim's session. The vulnerability has been assigned a CVSS v3.1 base score of 8.1 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N. The vulnerability is associated with multiple CWE categories including CWE-565 (Reliance on Cookies without Validation and Integrity Checking), CWE-79 (Cross-site Scripting), and CWE-352 (Cross-Site Request Forgery) (NVD).

Impact

The exploitation of this vulnerability can lead to full access to the JupyterHub API and user's single-user server. Specifically, attackers can create and exfiltrate API tokens, access and exfiltrate all files hosted on the user's single-user server (including notebooks and images), and install malicious extensions that could serve as backdoors for persistent access to the victim's session (GitHub Advisory).

Mitigation and workarounds

To mitigate this vulnerability, administrators should upgrade to JupyterHub 4.1.0 or later. Additional recommended security measures include: enabling per-user domains via 'c.JupyterHub.subdomain_host = "https://mydomain.example.org"', setting 'c.JupyterHub.cookie_host_prefix_enabled = True' to enable domain-locked cookies, and deploying JupyterHub on its own domain not shared with other services (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-66hx-chf7-3332HIGH8.8
  • PythonPython
  • pyload-ng
NoNoApr 14, 2026
CVE-2026-40192HIGH8.7
  • PythonPython
  • pillow
NoYesApr 15, 2026
CVE-2026-40347MEDIUM5.3
  • PythonPython
  • python-multipart
NoYesApr 15, 2026
GHSA-jj6c-8h6c-hppxMEDIUM4.8
  • PythonPython
  • pypdf
NoYesApr 15, 2026
GHSA-fj52-5g4h-gmq8LOW2.9
  • PythonPython
  • pyload-ng
NoNoApr 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management