CVE-2023-49080: jupyter-server errors include tracebacks with path information
(updated )
Unhandled errors in API requests include traceback information, which can include path information. There is no known mechanism by which to trigger these errors without authentication, so the paths revealed are not considered particularly sensitive, given that the requesting user has arbitrary execution permissions already in the same environment.
References
- github.com/advisories/GHSA-h56g-gq9v-vc8r
- github.com/jupyter-server/jupyter_server
- github.com/jupyter-server/jupyter_server/commit/0056c3aa52cbb28b263a7a609ae5f17618b36652
- github.com/jupyter-server/jupyter_server/security/advisories/GHSA-h56g-gq9v-vc8r
- github.com/pypa/advisory-database/tree/main/vulns/jupyter-server/PYSEC-2023-272.yaml
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62LO7PPIAMLIDEKUOORXLHKLGA6QPL77
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG2JWZI5KPUYMDPS53AIFTZJWZD3IT6I
- nvd.nist.gov/vuln/detail/CVE-2023-49080
Detect and mitigate CVE-2023-49080 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →