UBUNTU-CVE-2020-26275

Source
https://ubuntu.com/security/CVE-2020-26275
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-26275.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2020-26275
Related
Published
2020-12-21T18:15:00Z
Modified
2025-01-13T10:22:17Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints) for Jupyter web applications like Jupyter notebook, JupyterLab, and Voila. In Jupyter Server before version 1.1.1, an open redirect vulnerability could cause the jupyter server to redirect the browser to a different malicious website. All jupyter servers running without a baseurl prefix are technically affected, however, these maliciously crafted links can only be reasonably made for known jupyter server hosts. A link to your jupyter server may *appear* safe, but ultimately redirect to a spoofed server on the public internet. This same vulnerability was patched in upstream notebook v5.7.8. This is fixed in jupyterserver 1.1.1. If upgrade is not available, a workaround can be to run your server on a url prefix: "jupyter server --ServerApp.base_url=/jupyter/".

References

Affected packages

Ubuntu:22.04:LTS / jupyter-server

Package

Name
jupyter-server
Purl
pkg:deb/ubuntu/jupyter-server@1.13.1-1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2.2-1
1.13.1-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}