QID 983223

QID 983223: Python (pip) Security Update for oauthenticator (GHSA-384w-5v3f-q499)

Security update has been released for oauthenticator to fix the vulnerability.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

__What goes wrong?__

The deprecated (in jupyterhub 1.2) configuration `Authenticator.whitelist`, which should be transparently mapped to `Authenticator.allowed_users` with a warning, is instead ignored by OAuthenticator classes, resulting in the same behavior as if this configuration has not been set. If this is the only mechanism of authorization restriction (i.e. no group or team restrictions in configuration) then all authenticated users will be allowed. Provider-based restrictions, including deprecated values such as `GitHubOAuthenticator.org_whitelist` are **not** affected.

__Who is impacted?__

All users of OAuthenticator 0.12.0 and 0.12.1 with JupyterHub 1.2 (JupyterHub Helm chart 0.10.0-0.10.5) who use the `admin.whitelist.users` configuration in the jupyterhub helm chart or the `c.Authenticator.whitelist` configuration directly. Users of other deprecated configuration, e.g. `c.GitHubOAuthenticator.team_whitelist` are **not** affected.

If you see a log line like this and expect a specific list of allowed usernames:

```
[I 2020-11-27 16:51:54.528 JupyterHub app:1717] Not using allowed_users. Any authenticated user will be allowed.
```

you are likely affected.

  • CVSS V3 rated as High - 6.3 severity.
  • CVSS V2 rated as Medium - 3.5 severity.
  • Solution
    - Replacing deprecated `c.Authenticator.whitelist = ...` with `c.Authenticator.allowed_users = ...` avoids the issue.
    - Update oauthenticator to 0.12.2
    - Update jupyterhub helm chart to 0.10.6

    If any users have been authorized during this time who should not have been, they must be deleted via the API or admin interface, [per the documentation](https://jupyterhub.readthedocs.io/en/1.2.2/getting-started/authenticators-users-basics.html#add-or-remove-users-from-the-hub).Workaround:
    Replacing `c.Authenticator.whitelist = ...` with `c.Authenticator.allowed_users = ...` avoids the issue.

    In the jupyterhub helm chart prior to 0.10.6, this can be done via `hub.extraConfig`:

    ```yaml
    auth:
    allowedUsers:
    - user1
    - user2

    hub:
    extraConfig:
    allowedUsers: |
    # set new field not exposed in helm chart < 0.10.6
    set_config_if_not_none(c.Authenticator, "allowed_users", "auth.allowedUsers")
    ```
    Vendor References

    CVEs related to QID 983223

    Software Advisories
    Advisory ID Software Component Link
    GHSA-384w-5v3f-q499 oauthenticator URL Logo github.com/advisories/GHSA-384w-5v3f-q499