CVE-2023-39968 – jupyter-server
Package
Manager: pip
Name: jupyter-server
Vulnerable Version: >=0 <2.7.2
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
EPSS: 0.00516 pctl0.65717
Details
Open Redirect Vulnerability in jupyter-server ### Impact Open Redirect Vulnerability. Maliciously crafted login links to known Jupyter Servers can cause successful login or an already logged-in session to be redirected to arbitrary sites, which should be restricted to Jupyter Server-served URLs. ### Patches Upgrade to Jupyter Server 2.7.2 ### Workarounds None. ### References Vulnerability reported by user davwwwx via the [bug bounty program](https://app.intigriti.com/programs/jupyter/jupyter/detail) [sponsored by the European Commission](https://commission.europa.eu/news/european-commissions-open-source-programme-office-starts-bug-bounties-2022-01-19_en) and hosted on the [Intigriti platform](https://www.intigriti.com/). - https://blog.xss.am/2023/08/cve-2023-39968-jupyter-token-leak/
Metadata
Created: 2023-08-29T23:34:22Z
Modified: 2024-09-24T20:40:54Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/08/GHSA-r726-vmfq-j9j3/GHSA-r726-vmfq-j9j3.json
CWE IDs: ["CWE-601"]
Alternative ID: GHSA-r726-vmfq-j9j3
Finding: F156
Auto approve: 1