logo

CVE-2020-26215 notebook

Package

Manager: pip
Name: notebook
Vulnerable Version: >=0 <6.1.5

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:L

EPSS: 0.00691 pctl0.70926

Details

Open redirect in Jupyter Notebook ### Impact _What kind of vulnerability is it? Who is impacted?_ Open redirect vulnerability - a maliciously crafted link to a notebook server could redirect the browser to a different website. All notebook servers are technically affected, however, these maliciously crafted links can only be reasonably made for known notebook server hosts. A link to your notebook server may *appear* safe, but ultimately redirect to a spoofed server on the public internet. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Patched in notebook 6.1.5 ### References [OWASP page on open redirects](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html) ### For more information If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list [security@ipython.org](mailto:security@ipython.org). Credit: zhuonan li of Alibaba Application Security Team

Metadata

Created: 2020-11-18T21:06:36Z
Modified: 2024-09-25T17:58:43Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/11/GHSA-c7vm-f5p4-8fqh/GHSA-c7vm-f5p4-8fqh.json
CWE IDs: ["CWE-601"]
Alternative ID: GHSA-c7vm-f5p4-8fqh
Finding: F156
Auto approve: 1