2.15.0
6 years ago
2 months ago
Known vulnerabilities in the jupyter-server package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Information Exposure through the How to fix Information Exposure? Upgrade | [,1.23.6)[2.0.0,2.3.0) |
Affected versions of this package are vulnerable to Information Exposure through the NTLMv2 password hash exposure process. An attacker can obtain and potentially crack this hash to gain unauthorized access to the Windows machine hosting the server or to other network-accessible machines or third-party services using the same credentials. How to fix Information Exposure? Upgrade | [,2.14.1) |
Affected versions of this package are vulnerable to Generation of Error Message Containing Sensitive Information. When handling API requests from an authenticated user, unhandled errors include traceback information, which can reveal path information. The revealed paths are not considered particularly sensitive, given that the requesting user has arbitrary execution permissions already in the same environment. How to fix Generation of Error Message Containing Sensitive Information? Upgrade | [,2.11.2) |
Affected versions of this package are vulnerable to Open Redirect via maliciously crafted login links, which allows an attacker to redirect a successful login or an already logged-in session to arbitrary sites. How to fix Open Redirect? Upgrade | [,2.7.2) |
Affected versions of this package are vulnerable to Access Control Bypass via the Note: This is due to an incomplete fix of CVE-2019-9644 How to fix Access Control Bypass? Upgrade | [,2.7.2) |
Affected versions of this package are vulnerable to Information Exposure when the notebook server is started with a value of How to fix Information Exposure? Upgrade | [,1.17.1) |
Affected versions of this package are vulnerable to Information Exposure by logging the authentication cookie and other header values every time a 5xx error is triggered, by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server. How to fix Information Exposure? Upgrade | [,1.15.4) |
Affected versions of this package are vulnerable to Open Redirect. A maliciously crafted link to a jupyter server could redirect the browser to a different website. All jupyter servers running without a How to fix Open Redirect? Upgrade | [,1.1.1) |
Affected versions of this package are vulnerable to Open Redirect. A maliciously crafted link to a jupyter server could redirect the browser to a different website. How to fix Open Redirect? Upgrade | [,1.0.6) |