QID 982826

QID 982826: Python (pip) Security Update for jupyter-server (GHSA-9f66-54xg-pc2c)

Security update has been released for jupyter-server to fix the vulnerability.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

_What kind of vulnerability is it? Who is impacted?_

Open redirect vulnerability - a maliciously crafted link to a jupyter server could redirect the browser to a different website.

All jupyter servers running without a base_url prefix are technically affected, however, these maliciously crafted links can only be reasonably made for known jupyter server hosts. A link to your jupyter server may *appear* safe, but ultimately redirect to a spoofed server on the public internet. This same vulnerability was patched in upstream notebook v5.7.8.

  • CVSS V3 rated as High - 6.1 severity.
  • CVSS V2 rated as Medium - 5.8 severity.
  • Solution
    _Has the problem been patched? What versions should users upgrade to?_

    Patched in jupyter_server 1.1.1. If upgrade is not available, a workaround can be to run your server on a url prefix:

    ```
    jupyter server --ServerApp.base_url=/jupyter/
    ```
    Vendor References

    CVEs related to QID 982826

    Software Advisories
    Advisory ID Software Component Link
    GHSA-9f66-54xg-pc2c jupyter-server URL Logo github.com/advisories/GHSA-9f66-54xg-pc2c