UBUNTU-CVE-2023-40170

Source
https://ubuntu.com/security/CVE-2023-40170
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-40170.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2023-40170
Related
Published
2023-08-28T21:15:00Z
Modified
2024-10-15T14:11:43Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

jupyter-server is the backend for Jupyter web applications. Improper cross-site credential checks on /files/ URLs could allow exposure of certain file contents, or accessing files when opening untrusted files via "Open image in new tab". This issue has been addressed in commit 87a49272728 which has been included in release 2.7.2. Users are advised to upgrade. Users unable to upgrade may use the lower performance --ContentsManager.files_handler_class=jupyter_server.files.handlers.FilesHandler, which implements the correct checks.

References

Affected packages

Ubuntu:22.04:LTS / jupyter-server

Package

Name
jupyter-server
Purl
pkg:deb/ubuntu/jupyter-server?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2.2-1
1.13.1-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.10 / jupyter-server

Package

Name
jupyter-server
Purl
pkg:deb/ubuntu/jupyter-server?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.23.3-2

2.*

2.14.2-4

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.04:LTS / jupyter-server

Package

Name
jupyter-server
Purl
pkg:deb/ubuntu/jupyter-server?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.23.3-1
1.23.3-2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}