Improper cross-site credential checks on /files/
URLs could allow exposure of certain file contents, or accessing files when opening untrusted files via "Open image in new tab".
Jupyter Server 2.7.2
Use lower performance --ContentsManager.files_handler_class=jupyter_server.files.handlers.FilesHandler
, which implements the correct checks.
Upstream patch for CVE-2019-9644 was not applied completely, leaving part of the vulnerability open.
Vulnerability reported by Tim Coen via the bug bounty program sponsored by the European Commission and hosted on the Intigriti platform.
{ "nvd_published_at": "2023-08-28T21:15:07Z", "cwe_ids": [ "CWE-284", "CWE-306", "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-08-29T23:34:09Z" }