Safety vulnerability ID: 72556
The information on this page was manually curated by our Cybersecurity Intelligence Team.
In jupyterhub affected versions, if a user is granted the `admin:users` scope, they may escalate their privileges by making themselves a full admin user. The impact is relatively small because `admin:users` is already an extremely privileged scope only granted to trusted users. In effect, `admin:users` is equivalent to `admin=True`, which is not intended. Note that the change here only prevents escalation to the built-in JupyterHub admin role with unrestricted permissions. It does not prevent users with e.g. `groups` permissions from granting themselves or other users permissions via group membership, which is intentional.
Latest version: 5.2.1
JupyterHub: A multi-user server for Jupyter notebooks
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application