{"api_version":"1","generated_at":"2026-04-27T01:28:25+00:00","cve":"CVE-2021-41247","urls":{"html":"https://cve.report/CVE-2021-41247","api":"https://cve.report/api/cve/CVE-2021-41247.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-41247","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-41247"},"summary":{"title":"CVE-2021-41247","description":"JupyterHub is an open source multi-user server for Jupyter notebooks. In affected versions users who have multiple JupyterLab tabs open in the same browser session, may see incomplete logout from the single-user server, as fresh credentials (for the single-user server only, not the Hub) reinstated after logout, if another active JupyterLab session is open while the logout takes place. Upgrade to JupyterHub 1.5. For distributed deployments, it is jupyterhub in the _user_ environment that needs patching. There are no patches necessary in the Hub environment. The only workaround is to make sure that only one JupyterLab tab is open when you log out.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2021-11-04 18:15:00","updated_at":"2021-11-10 17:12:00"},"problem_types":["CWE-613"],"metrics":[],"references":[{"url":"https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-cw7p-q79f-m2v7","name":"https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-cw7p-q79f-m2v7","refsource":"CONFIRM","tags":[],"title":"incomplete JupyterHub logout with simultaneous JupyterLab sessions · Advisory · jupyterhub/jupyterhub · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/jupyterhub/jupyterhub/commit/5ac9e7f73a6e1020ffddc40321fc53336829fe27","name":"https://github.com/jupyterhub/jupyterhub/commit/5ac9e7f73a6e1020ffddc40321fc53336829fe27","refsource":"MISC","tags":[],"title":"Merge branch 'fix-set-cookie' into 1.4.x · jupyterhub/jupyterhub@5ac9e7f · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-41247","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41247","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"41247","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jupyter","cpe5":"jupyterhub","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-41247","qid":"182139","title":"Debian Security Update for jupyterhub (CVE-2021-41247)"},{"cve":"CVE-2021-41247","qid":"980206","title":"Python (pip) Security Update for jupyterhub (GHSA-cw7p-q79f-m2v7)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2021-41247","STATE":"PUBLIC","TITLE":"incomplete logout in JupyterHub"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"jupyterhub","version":{"version_data":[{"version_value":">= 1.0.0, < 1.5.0 -  jupyterhub (pip)"},{"version_value":"< 1.2.0 -  jupyterhub (helm) "}]}}]},"vendor_name":"jupyterhub"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"JupyterHub is an open source multi-user server for Jupyter notebooks. In affected versions users who have multiple JupyterLab tabs open in the same browser session, may see incomplete logout from the single-user server, as fresh credentials (for the single-user server only, not the Hub) reinstated after logout, if another active JupyterLab session is open while the logout takes place. Upgrade to JupyterHub 1.5. For distributed deployments, it is jupyterhub in the _user_ environment that needs patching. There are no patches necessary in the Hub environment. The only workaround is to make sure that only one JupyterLab tab is open when you log out."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":3.5,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-613: Insufficient Session Expiration"}]}]},"references":{"reference_data":[{"name":"https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-cw7p-q79f-m2v7","refsource":"CONFIRM","url":"https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-cw7p-q79f-m2v7"},{"name":"https://github.com/jupyterhub/jupyterhub/commit/5ac9e7f73a6e1020ffddc40321fc53336829fe27","refsource":"MISC","url":"https://github.com/jupyterhub/jupyterhub/commit/5ac9e7f73a6e1020ffddc40321fc53336829fe27"}]},"source":{"advisory":"GHSA-cw7p-q79f-m2v7","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-11-04 18:15:00","lastModifiedDate":"2021-11-10 17:12:00","problem_types":["CWE-613"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:jupyter:jupyterhub:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.5.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"41247","Ordinal":"216965","Title":"CVE-2021-41247","CVE":"CVE-2021-41247","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"41247","Ordinal":"1","NoteData":"JupyterHub is an open source multi-user server for Jupyter notebooks. In affected versions users who have multiple JupyterLab tabs open in the same browser session, may see incomplete logout from the single-user server, as fresh credentials (for the single-user server only, not the Hub) reinstated after logout, if another active JupyterLab session is open while the logout takes place. Upgrade to JupyterHub 1.5. For distributed deployments, it is jupyterhub in the _user_ environment that needs patching. There are no patches necessary in the Hub environment. The only workaround is to make sure that only one JupyterLab tab is open when you log out.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"41247","Ordinal":"2","NoteData":"2021-11-04","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"41247","Ordinal":"3","NoteData":"2021-11-04","Type":"Other","Title":"Modified"}]}}}