Name | CVE-2023-39968 |
Description | jupyter-server is the backend for Jupyter web applications. Open Redirect Vulnerability. Maliciously crafted login links to known Jupyter Servers can cause successful login or an already logged-in session to be redirected to arbitrary sites, which should be restricted to Jupyter Server-served URLs. This issue has been addressed in commit `29036259` which is included in release 2.7.2. Users are advised to upgrade. There are no known workarounds for this vulnerability. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1057739 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
jupyter-server (PTS) | bullseye | 1.2.2-1 | vulnerable |
| bookworm | 1.23.3-1 | vulnerable |
| sid, trixie | 2.14.2-4 | fixed |
The information below is based on the following data on fixed versions.
Notes
[bookworm] - jupyter-server <no-dsa> (Minor issue)
[bullseye] - jupyter-server <no-dsa> (Minor issue)
https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-r726-vmfq-j9j3
https://github.com/jupyter-server/jupyter_server/commit/290362593b2ffb23c59f8114d76f77875de4b925 (v2.7.2)