CVE-2024-35178
Python vulnerability analysis and mitigation

Overview

The Jupyter Server, which provides the backend for Jupyter web applications like Jupyter Notebook and JupyterLab, contains a vulnerability (CVE-2024-35178) that affects Windows systems. The vulnerability allows unauthenticated attackers to leak the NTLMv2 password hash of the Windows user running the Jupyter server. This security issue was discovered in versions 2.14.0 and earlier, with a fix released in version 2.14.1 (GitHub Advisory).

Technical details

The vulnerability exists in the file handling mechanism of Jupyter Server on Windows systems. When serving static files, Jupyter Server implements a custom FileFindHandler that extends Tornado's built-in StaticFileHandler. The issue occurs in the filefind function where file system operations are performed on insufficiently validated input before verifying that the user-provided path is within a restricted directory. This allows attackers to trigger SMB callbacks to attacker-controlled servers by providing specially crafted UNC paths (Horizon3).

Impact

The vulnerability has significant security implications as it allows attackers to capture the NTLMv2 hash of the Windows user running the Jupyter server. This hash can be either cracked to reveal the plaintext password, potentially giving attackers access to the Windows machine hosting the Jupyter server, or used in NTLM relay attacks to gain access to other network-accessible machines or third-party services using those credentials (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in Jupyter Server version 2.14.1. Organizations should upgrade to this version or later immediately. Additionally, it is recommended to configure host/network firewalls to block SMB traffic going out to the Internet to prevent exploitation of forced Windows authentication vulnerabilities in general (Horizon3).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management