5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
0.001 Low
EPSS
Percentile
49.1%
The Jupyter Server provides the backend (i.e. the core services, APIs, and
REST endpoints) for Jupyter web applications like Jupyter notebook,
JupyterLab, and Voila. In Jupyter Server before version 1.1.1, an open
redirect vulnerability could cause the jupyter server to redirect the
browser to a different malicious website. All jupyter servers running
without a base_url prefix are technically affected, however, these
maliciously crafted links can only be reasonably made for known jupyter
server hosts. A link to your jupyter server may appear safe, but
ultimately redirect to a spoofed server on the public internet. This same
vulnerability was patched in upstream notebook v5.7.8. This is fixed in
jupyter_server 1.1.1. If upgrade is not available, a workaround can be to
run your server on a url prefix: “jupyter server
–ServerApp.base_url=/jupyter/”.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 22.04 | noarch | jupyter-server | < any | UNKNOWN |
github.com/jupyter-server/jupyter_server/commit/85e4abccf6ea9321d29153f73b0bd72ccb3a6bca
github.com/jupyter-server/jupyter_server/security/advisories/GHSA-9f66-54xg-pc2c
launchpad.net/bugs/cve/CVE-2020-26275
nvd.nist.gov/vuln/detail/CVE-2020-26275
pypi.org/project/jupyter-server/
security-tracker.debian.org/tracker/CVE-2020-26275
www.cve.org/CVERecord?id=CVE-2020-26275
5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
0.001 Low
EPSS
Percentile
49.1%