Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-40170
HistoryAug 28, 2023 - 8:01 p.m.

CVE-2023-40170 cross-site inclusion (XSSI) of files in jupyter-server

2023-08-2820:01:57
CWE-284
CWE-306
GitHub_M
www.cve.org
jupyter-server
xssi
vulnerability
file access
jupyter-server 2.7.2
upgrade
credential checks

4.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.6%

jupyter-server is the backend for Jupyter web applications. Improper cross-site credential checks on /files/ URLs could allow exposure of certain file contents, or accessing files when opening untrusted files via “Open image in new tab”. This issue has been addressed in commit 87a49272728 which has been included in release 2.7.2. Users are advised to upgrade. Users unable to upgrade may use the lower performance --ContentsManager.files_handler_class=jupyter_server.files.handlers.FilesHandler, which implements the correct checks.

CNA Affected

[
  {
    "vendor": "jupyter-server",
    "product": "jupyter_server",
    "versions": [
      {
        "version": "< 2.7.2",
        "status": "affected"
      }
    ]
  }
]

4.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.6%