First published: Mon Dec 04 2023(Updated: )
### Impact Unhandled errors in API requests include traceback information, which can include path information. There is no known mechanism by which to trigger these errors without authentication, so the paths revealed are not considered particularly sensitive, given that the requesting user has arbitrary execution permissions already in the same environment. ### Patches jupyter-server PATCHED_VERSION no longer includes traceback information in JSON error responses. For compatibility, the traceback field is present, but always empty. ### Workarounds None
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/jupyter-server | <2.11.2 | 2.11.2 |
Jupyter Jupyter Server | <2.11.2 |
https://github.com/jupyter-server/jupyter_server/commit/0056c3aa52cbb28b263a7a609ae5f17618b36652
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Jupyter Server vulnerability is CVE-2023-49080.
CVE-2023-49080 has a severity level of low.
The Jupyter Server package version up to exclusive 2.11.2 is affected by CVE-2023-49080.
To fix CVE-2023-49080, you should upgrade the Jupyter Server package to version 2.11.2 or higher.
The Common Weakness Enumeration (CWE) number associated with CVE-2023-49080 is CWE-209.