Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints) for Jupyter web applications like Jupyter Notebook. Prior to version 1.17.1, if notebook server is started with a value of `root_dir` that contains the starting user's home directory, then the underlying REST API can be used to leak the access token assigned at start time by guessing/brute forcing the PID of the jupyter server. While this requires an authenticated user session, this URL can be used from a cross-site scripting payload or from a hooked or otherwise compromised browser to leak this access token to a malicious third party. This token can be used along with the REST API to interact with Jupyter services/notebooks such as modifying or overwriting critical files, such as .bashrc or .ssh/authorized_keys, allowing a malicious user to read potentially sensitive data and possibly gain control of the impacted system. This issue is patched in version 1.17.1.
References
Link | Resource |
---|---|
https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-q874-g24w-4q9g | Third Party Advisory |
Configurations
History
24 Jun 2022, 17:16
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-q874-g24w-4q9g - Third Party Advisory | |
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : 9.0
v3 : 8.8 |
CPE | cpe:2.3:a:jupyter:jupyter_server:*:*:*:*:*:*:*:* |
14 Jun 2022, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-06-14 21:15
Updated : 2024-02-04 22:29
NVD link : CVE-2022-29241
Mitre link : CVE-2022-29241
CVE.ORG link : CVE-2022-29241
JSON object : View
Products Affected
jupyter
- jupyter_server
CWE