Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-49080
HistoryDec 04, 2023 - 12:00 a.m.

CVE-2023-49080

2023-12-0400:00:00
ubuntu.com
ubuntu.com
9
jupyter server
backend services
unhandled errors
json responses
authentication
upgrade
vulnerability

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

33.4%

The Jupyter Server provides the backend (i.e. the core services, APIs, and
REST endpoints) for Jupyter web applications like Jupyter notebook,
JupyterLab, and Voila. Unhandled errors in API requests coming from an
authenticated user include traceback information, which can include path
information. There is no known mechanism by which to trigger these errors
without authentication, so the paths revealed are not considered
particularly sensitive, given that the requesting user has arbitrary
execution permissions already in the same environment. A fix has been
introduced in commit 0056c3aa52 which no longer includes traceback
information in JSON error responses. For compatibility, the traceback field
is present, but always empty. This commit has been included in version
2.11.2. Users are advised to upgrade. There are no known workarounds for
this vulnerability.

OSVersionArchitecturePackageVersionFilename
ubuntu22.04noarchjupyter-server< anyUNKNOWN
ubuntu24.04noarchjupyter-server< anyUNKNOWN

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

33.4%