Bug 2252896 (CVE-2023-49080) - CVE-2023-49080 jupyter-server: Server errors include tracebacks with path information
Summary: CVE-2023-49080 jupyter-server: Server errors include tracebacks with path inf...
Keywords:
Status: NEW
Alias: CVE-2023-49080
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2252897
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-12-05 06:40 UTC by Pedro Sampaio
Modified: 2023-12-05 06:41 UTC (History)
0 users

Fixed In Version: python-jupyter-server 2.11.2
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Pedro Sampaio 2023-12-05 06:40:46 UTC
The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints) for Jupyter web applications like Jupyter notebook, JupyterLab, and Voila. Unhandled errors in API requests coming from an authenticated user include traceback information, which can include path information. There is no known mechanism by which to trigger these errors without authentication, so the paths revealed are not considered particularly sensitive, given that the requesting user has arbitrary execution permissions already in the same environment. A fix has been introduced in commit `0056c3aa52` which no longer includes traceback information in JSON error responses. For compatibility, the traceback field is present, but always empty. This commit has been included in version 2.11.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References:

https://github.com/jupyter-server/jupyter_server/commit/0056c3aa52cbb28b263a7a609ae5f17618b36652
https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-h56g-gq9v-vc8r

Comment 1 Pedro Sampaio 2023-12-05 06:41:03 UTC
Created python-jupyter-server tracking bugs for this issue:

Affects: fedora-all [bug 2252897]


Note You need to log in before you can comment on or make changes to this bug.