Information Exposure Affecting jupyter-server package, versions [,2.14.1)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.11% (46th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-JUPYTERSERVER-7217832
  • published7 Jun 2024
  • disclosed6 Jun 2024
  • creditnvn1729

Introduced: 6 Jun 2024

CVE-2024-35178  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade jupyter-server to version 2.14.1 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure through the NTLMv2 password hash exposure process. An attacker can obtain and potentially crack this hash to gain unauthorized access to the Windows machine hosting the server or to other network-accessible machines or third-party services using the same credentials.

References

CVSS Scores

version 3.1