Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0103 | jupyter-server is the backend for Jupyter web applications. Improper cross-site credential checks on `/files/` URLs could allow exposure of certain file contents, or accessing files when opening untrusted files via "Open image in new tab". This issue has been addressed in commit `87a49272728` which has been included in release `2.7.2`. Users are advised to upgrade. Users unable to upgrade may use the lower performance `--ContentsManager.files_handler_class=jupyter_server.files.handlers.FilesHandler`, which implements the correct checks. |
Github GHSA |
GHSA-64x5-55rw-9974 | cross-site inclusion (XSSI) of files in jupyter-server |
Mon, 30 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T17:03:25.640Z
Reserved: 2023-08-09T15:26:41.051Z
Link: CVE-2023-40170
Updated: 2024-08-02T18:24:55.535Z
Status : Modified
Published: 2023-08-28T21:15:07.873
Modified: 2024-11-21T08:18:55.140
Link: CVE-2023-40170
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA