// For flags

CVE-2020-26275

Open redirect vulnerability

Severity Score

6.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints) for Jupyter web applications like Jupyter notebook, JupyterLab, and Voila. In Jupyter Server before version 1.1.1, an open redirect vulnerability could cause the jupyter server to redirect the browser to a different malicious website. All jupyter servers running without a base_url prefix are technically affected, however, these maliciously crafted links can only be reasonably made for known jupyter server hosts. A link to your jupyter server may *appear* safe, but ultimately redirect to a spoofed server on the public internet. This same vulnerability was patched in upstream notebook v5.7.8. This is fixed in jupyter_server 1.1.1. If upgrade is not available, a workaround can be to run your server on a url prefix: "jupyter server --ServerApp.base_url=/jupyter/".

Jupyter Server proporciona el backend (es decir, los servicios centrales, las API y los endpoints REST) ??para las aplicaciones web de Jupyter como Jupyter notebook, JupyterLab y Voila. En Jupyter Server versiones anteriores a 1.1.1, una vulnerabilidad de redireccionamiento abierto podría causar que el servidor jupyter redireccione el navegador hacia un sitio web malicioso diferente. Todos los servidores jupyter que se ejecutan sin un prefijo base_url están técnicamente afectados; sin embargo, estos enlaces diseñados maliciosamente pueden sólo ser razonablemente hechos para hosts de servidores jupyter conocidos. Un enlace a su servidor jupyter puede *appear* seguro, pero en última instancia, redirigido hacia un servidor falsificado en la Internet pública. Esta misma vulnerabilidad fue parcheada en la versión 5.7.8 del portátil ascendente. Esto se corrigió en jupyter_server versión 1.1.1. Si la actualización no está disponible, una solución alternativa puede ser ejecutar su servidor con un prefijo de url: "jupyter server --ServerApp.base_url=/jupyter/"

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-10-01 CVE Reserved
  • 2020-12-21 CVE Published
  • 2023-09-06 EPSS Updated
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Jupyter
Search vendor "Jupyter"
Jupyter Server
Search vendor "Jupyter" for product "Jupyter Server"
< 1.1.1
Search vendor "Jupyter" for product "Jupyter Server" and version " < 1.1.1"
-
Affected