First published: Wed Mar 23 2022(Updated: )
The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints) for Jupyter web applications. Prior to version 1.15.4, unauthorized actors can access sensitive information from server logs. Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter Server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server. Jupyter Server version 1.15.4 contains a patch for this issue. There are currently no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jupyter Jupyter Server | <1.15.4 |
https://github.com/jupyter-server/jupyter_server/commit/a5683aca0b0e412672ac6218d09f74d44ca0de5a
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24757 is a vulnerability in Jupyter Server that allows unauthorized actors to access sensitive information from server logs.
CVE-2022-24757 has a severity rating of high with a score of 7.5.
CVE-2022-24757 affects Jupyter Server versions up to 1.15.4, allowing unauthorized actors to access sensitive information from server logs.
To fix CVE-2022-24757, you should update Jupyter Server to version 1.15.4 or later, which includes a fix for this vulnerability.
You can find more information about CVE-2022-24757 on the GitHub page for Jupyter Server, including the commit containing the fix and the security advisory.