Access Control Bypass Affecting jupyter-server package, versions [,2.7.2)
Threat Intelligence
EPSS
0.08% (38th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-JUPYTERSERVER-5862881
- published 29 Aug 2023
- disclosed 28 Aug 2023
- credit Tim Coen
Introduced: 28 Aug 2023
CVE-2023-40170 Open this link in a new tabHow to fix?
Upgrade jupyter-server
to version 2.7.2 or higher.
Overview
Affected versions of this package are vulnerable to Access Control Bypass via the /files/
URLs due to improper cross-site credentials validation. An attacker can expose certain file contents or access files when opening untrusted files via "Open image in new tab".
Note: This is due to an incomplete fix of CVE-2019-9644
Workaround
This vulnerability can be mitigated by using the lower performance --ContentsManager.files_handler_class=jupyter_server.files.handlers.FilesHandler
, which implements the correct checks.
References
CVSS Scores
version 3.1