Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. dockerspawner
  4. ›
  5. CVE-2023-48311

CVE-2023-48311: Improper Input Validation

December 8, 2023

dockerspawner is a tool to spawn JupyterHub single user servers in Docker containers. Users of JupyterHub deployments running DockerSpawner starting with 0.11.0 without specifying DockerSpawner.allowed_images configuration allow users to launch any pullable docker image, instead of restricting to only the single configured image, as intended. This issue has been addressed in commit 3ba4b665b which has been included in dockerspawner release version 13. Users are advised to upgrade. Users unable to upgrade should explicitly set DockerSpawner.allowed_images to a non-empty list containing only the default image will result in the intended default behavior.

References

  • github.com/advisories/GHSA-hfgr-h3vc-p6c2
  • github.com/jupyterhub/dockerspawner/commit/3ba4b665b6ca6027ea7a032d7ca3eab977574626
  • github.com/jupyterhub/dockerspawner/security/advisories/GHSA-hfgr-h3vc-p6c2
  • nvd.nist.gov/vuln/detail/CVE-2023-48311

Code Behaviors & Features

Detect and mitigate CVE-2023-48311 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.11.0 before 13.0.0

Fixed versions

  • 13.0.0

Solution

Upgrade to version 13.0.0 or above.

Impact 8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-20: Improper Input Validation

Source file

pypi/dockerspawner/CVE-2023-48311.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:37 +0000.