We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-32428

Jupyter Remote Desktop Proxy makes TigerVNC accessible via the network and not just via a UNIX socket as intended



Description

Jupyter Remote Desktop Proxy allows you to run a Linux Desktop on a JupyterHub. jupyter-remote-desktop-proxy was meant to rely on UNIX sockets readable only by the current user since version 3.0.0, but when used with TigerVNC, the VNC server started by jupyter-remote-desktop-proxy were still accessible via the network. This vulnerability does not affect users having TurboVNC as the vncserver executable. This issue is fixed in 3.0.1.

Reserved 2025-04-08 | Published 2025-04-14 | Updated 2025-04-15 | Assigner GitHub_M


CRITICAL: 9.0CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-668: Exposure of Resource to Wrong Sphere

Product status

>= 3.0.0, < 3.0.1
affected

References

github.com/...-proxy/security/advisories/GHSA-vrq4-9hc3-cgp7

github.com/...ommit/7dd54c25a4253badd8ea68895437e5a66a59090d

cve.org (CVE-2025-32428)

nvd.nist.gov (CVE-2025-32428)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-32428

Support options

Helpdesk Chat, Email, Knowledgebase