First published: Mon Aug 28 2023(Updated: )
### Impact Open Redirect Vulnerability. Maliciously crafted login links to known Jupyter Servers can cause successful login or an already logged-in session to be redirected to arbitrary sites, which should be restricted to Jupyter Server-served URLs. ### Patches Upgrade to Jupyter Server 2.7.2 ### Workarounds None. ### References Vulnerability reported by user davwwwx via the [bug bounty program](https://app.intigriti.com/programs/jupyter/jupyter/detail) [sponsored by the European Commission](https://commission.europa.eu/news/european-commissions-open-source-programme-office-starts-bug-bounties-2022-01-19_en) and hosted on the [Intigriti platform](https://www.intigriti.com/). - https://blog.xss.am/2023/08/cve-2023-39968-jupyter-token-leak/
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jupyter Jupyter Server | <2.7.2 | |
pip/jupyter-server | <2.7.2 | 2.7.2 |
<2.7.2 |
https://github.com/jupyter-server/jupyter_server/commit/290362593b2ffb23c59f8114d76f77875de4b925
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The impact is an open redirect vulnerability that can redirect a successful login or an already logged-in session to arbitrary sites.
You can fix CVE-2023-39968 by upgrading to Jupyter Server 2.7.2.
The severity of CVE-2023-39968 is medium with a CVSS score of 6.1.
The CWE for CVE-2023-39968 is CWE-79 (Improper Neutralization of Input During Web Page Generation) and CWE-601 (URL Redirection to Untrusted Site ('Open Redirect')).
You can find more information about CVE-2023-39968 at the following references: [1] [2] [3].