TigerVNC accessible via the network and not just via a UNIX socket as intended
Critical severity
GitHub Reviewed
Published
Apr 11, 2025
in
jupyterhub/jupyter-remote-desktop-proxy
•
Updated Apr 15, 2025
Description
Published to the GitHub Advisory Database
Apr 12, 2025
Reviewed
Apr 12, 2025
Published by the National Vulnerability Database
Apr 15, 2025
Last updated
Apr 15, 2025
Summary
jupyter-remote-desktop-proxy
was meant to rely on UNIX sockets readable only by the current user since version 3.0.0, but when used with TigerVNC, the VNC server started byjupyter-remote-desktop-proxy
were still accessible via the network.This vulnerability does not affect users having TurboVNC as the
vncserver
executable.Credits
This vulnerability was identified by Arne Gottwald at University of Göttingen and analyzed, reported, and reviewed by @frejanordsiek.
References