// For flags

CVE-2021-41247

incomplete logout in JupyterHub

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

JupyterHub is an open source multi-user server for Jupyter notebooks. In affected versions users who have multiple JupyterLab tabs open in the same browser session, may see incomplete logout from the single-user server, as fresh credentials (for the single-user server only, not the Hub) reinstated after logout, if another active JupyterLab session is open while the logout takes place. Upgrade to JupyterHub 1.5. For distributed deployments, it is jupyterhub in the _user_ environment that needs patching. There are no patches necessary in the Hub environment. The only workaround is to make sure that only one JupyterLab tab is open when you log out.

JupyterHub es un servidor multiusuario de código abierto para cuadernos Jupyter. En las versiones afectadas, los usuarios que presentan varias pestañas de JupyterLab abiertas en la misma sesión del navegador, pueden visualizar el cierre de sesión incompleto del servidor monopuesto, ya que las credenciales frescas (sólo para el servidor monopuesto, no para el Hub) son restablecidas después del cierre de sesión, si otra sesión activa de JupyterLab está abierta mientras se produce el cierre de sesión. Actualiza a JupyterHub 1.5. Para los despliegues distribuidos, es jupyterhub en el entorno del _usuario_ el que necesita parches. No es necesario aplicar parches en el entorno del Hub. La única solución es asegurarse de que sólo se presenta una pestaña de JupyterLab abierta cuando se cierra la sesión

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-09-15 CVE Reserved
  • 2021-11-04 CVE Published
  • 2024-07-20 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-613: Insufficient Session Expiration
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Jupyter
Search vendor "Jupyter"
Jupyterhub
Search vendor "Jupyter" for product "Jupyterhub"
>= 1.0.0 < 1.5.0
Search vendor "Jupyter" for product "Jupyterhub" and version " >= 1.0.0 < 1.5.0"
-
Affected