First published: Tue Nov 24 2020(Updated: )
### Impact _What kind of vulnerability is it? Who is impacted?_ Open redirect vulnerability - a maliciously crafted link to a jupyter server could redirect the browser to a different website. All jupyter servers are technically affected, however, these maliciously crafted links can only be reasonably made for known jupyter server hosts. A link to your jupyter server may *appear* safe, but ultimately redirect to a spoofed server on the public internet. This originated in jupyter/notebook: https://github.com/jupyter/notebook/security/advisories/GHSA-c7vm-f5p4-8fqh ### Patches _Has the problem been patched? What versions should users upgrade to?_ jupyter_server 1.0.6 ### References [OWASP page on open redirects](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html) ### For more information If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list [security@ipython.org](mailto:security@ipython.org). Credit: zhuonan li of Alibaba Application Security Team
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jupyter Jupyter Server | <1.0.6 | |
pip/jupyter-server | <1.0.6 | 1.0.6 |
<1.0.6 |
https://github.com/jupyter-server/jupyter_server/commit/3d83e49090289c431da253e2bdb8dc479cbcb157
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26232 is an Open redirect vulnerability in Jupyter Server before version 1.0.6.
CVE-2020-26232 affects all Jupyter Server versions before 1.0.6.
The severity of CVE-2020-26232 is medium with a CVSS score of 5.4.
To fix CVE-2020-26232, upgrade to Jupyter Server version 1.0.6 or later.
You can find more information about CVE-2020-26232 in the following references: [link1], [link2], [link3].