First published: Mon Aug 28 2023(Updated: )
### Impact Improper cross-site credential checks on `/files/` URLs could allow exposure of certain file contents, or accessing files when opening untrusted files via "Open image in new tab". ### Patches Jupyter Server 2.7.2 ### Workarounds Use lower performance `--ContentsManager.files_handler_class=jupyter_server.files.handlers.FilesHandler`, which implements the correct checks. ### References Upstream patch for CVE-2019-9644 was not applied completely, leaving part of the vulnerability open. Vulnerability reported by Tim Coen via the [bug bounty program](https://app.intigriti.com/programs/jupyter/jupyter/detail) [sponsored by the European Commission](https://commission.europa.eu/news/european-commissions-open-source-programme-office-starts-bug-bounties-2022-01-19_en) and hosted on the [Intigriti platform](https://www.intigriti.com/).
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/jupyter-server | <2.7.2 | 2.7.2 |
Jupyter Server Proxy | <2.7.2 |
https://github.com/jupyter-server/jupyter_server/commit/87a4927272819f0b1cae1afa4c8c86ee2da002fd
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-40170 is medium with a CVSS score of 6.1.
CVE-2023-40170 could allow exposure of certain file contents or unauthorized access to files when opening untrusted files via "Open image in new tab".
Versions up to and excluding 2.7.2 of Jupyter Server and Jupyter Jupyter Server are affected by CVE-2023-40170.
To fix CVE-2023-40170, update Jupyter Server to version 2.7.2 or apply the available patch.
A workaround for CVE-2023-40170 is to use the lower performance `--ContentsManager.files_handler` option.