Skip to content

jupyter-server errors include tracebacks with path information

Moderate severity GitHub Reviewed Published Dec 4, 2023 in jupyter-server/jupyter_server • Updated Dec 14, 2023

Package

pip jupyter-server (pip)

Affected versions

< 2.11.2

Patched versions

2.11.2

Description

Impact

Unhandled errors in API requests include traceback information, which can include path information. There is no known mechanism by which to trigger these errors without authentication, so the paths revealed are not considered particularly sensitive, given that the requesting user has arbitrary execution permissions already in the same environment.

Patches

jupyter-server PATCHED_VERSION no longer includes traceback information in JSON error responses. For compatibility, the traceback field is present, but always empty.

Workarounds

None

References

Published by the National Vulnerability Database Dec 4, 2023
Published to the GitHub Advisory Database Dec 5, 2023
Reviewed Dec 5, 2023
Last updated Dec 14, 2023

Severity

Moderate
4.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Weaknesses

CVE ID

CVE-2023-49080

GHSA ID

GHSA-h56g-gq9v-vc8r

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.