logo

CVE-2025-32428 jupyter-remote-desktop-proxy

Package

Manager: pip
Name: jupyter-remote-desktop-proxy
Vulnerable Version: =3.0.0 || >=3.0.0 <3.0.1

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.00032 pctl0.07739

Details

TigerVNC accessible via the network and not just via a UNIX socket as intended ## Summary `jupyter-remote-desktop-proxy` was meant to rely on UNIX sockets readable only by the current user since version 3.0.0, but when used with TigerVNC, the VNC server started by `jupyter-remote-desktop-proxy` were still accessible via the network. This vulnerability does not affect users having TurboVNC as the `vncserver` executable. ## Credits This vulnerability was identified by Arne Gottwald at University of Göttingen and analyzed, reported, and reviewed by @frejanordsiek.

Metadata

Created: 2025-04-12T03:42:31Z
Modified: 2025-04-15T12:49:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-vrq4-9hc3-cgp7/GHSA-vrq4-9hc3-cgp7.json
CWE IDs: ["CWE-668"]
Alternative ID: GHSA-vrq4-9hc3-cgp7
Finding: F017
Auto approve: 1