Generation of Error Message Containing Sensitive Information Affecting jupyter-server package, versions [,2.11.2)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.08% (36th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-JUPYTERSERVER-6099119
  • published5 Dec 2023
  • disclosed4 Dec 2023
  • creditkrsecu

Introduced: 4 Dec 2023

CVE-2023-49080  (opens in a new tab)
CWE-209  (opens in a new tab)

How to fix?

Upgrade jupyter-server to version 2.11.2 or higher.

Overview

Affected versions of this package are vulnerable to Generation of Error Message Containing Sensitive Information. When handling API requests from an authenticated user, unhandled errors include traceback information, which can reveal path information. The revealed paths are not considered particularly sensitive, given that the requesting user has arbitrary execution permissions already in the same environment.

References

CVSS Scores

version 3.1